stacksmith-safety
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
freezeandguardsubcommands take a user-suppliedpathargument and interpolate it directly into a shell environment variable and command (echo "$FREEZE_PATH" > ~/.mystack/freeze.txt). This creates a command injection vulnerability where a user can provide input containing shell metacharacters (e.g.,;,`,$( )) to execute arbitrary code in the agent's execution environment. - [DATA_EXFILTRATION]: The skill accesses the user's home directory to create a hidden folder (
~/.mystack) for state and logs. It also executes shell commands to collect metadata such as the current Git branch name (git branch --show-current) and the repository name (git rev-parse --show-toplevel). This information is appended to a local timeline log, representing exposure of project-related metadata.
Audit Metadata