resolve-merge-conflicts
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/extract_conflict_context.pyusessubprocess.runto execute standardgitcommands (ls-files,show,rev-parse). These calls are implemented using list-based arguments withoutshell=True, which is the recommended safe practice for executing external commands. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection (Category 8) because it processes text from conflicted files that may be attacker-controlled.
- Ingestion points: Conflicted file content and Git stage data are read in
scripts/extract_conflict_context.pyvia theread_text_fileandread_stage_textfunctions. - Boundary markers: The script provides structural labels for conflict hunks (e.g.,
ours,theirs,base), which provides some context separation, although it lacks explicit instructions to the agent to ignore natural language commands embedded within code sections. - Capability inventory: The script's operations are limited to read-only Git commands and local file reading; it does not include network access, filesystem write capabilities, or arbitrary code execution.
- Sanitization: Content extracted from conflict markers is presented verbatim without sanitization, which is expected for its intended purpose of conflict resolution.
Audit Metadata