githacker-git-leak
Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill installs the 'GitHacker' package from the Python Package Index (PyPI) and utilizes a Docker image from Docker Hub ('wangyihang/githacker'). These are standard package registries and official tool sources.\n- [COMMAND_EXECUTION]: Includes instructions to execute shell commands for tool installation and analysis of recovered data, such as 'git log', 'git branch', and 'grep'. These commands are focused on the task of source code auditing.\n- [DATA_EXFILTRATION]: While the skill retrieves remote data, it targets specified URLs for security auditing purposes and does not access or exfiltrate local sensitive system files or credentials.\n- [PROMPT_INJECTION]: The skill processes untrusted content from external repositories, posing a risk of indirect prompt injection.\n
- Ingestion points: Remote repository data, commit messages, and metadata downloaded via githacker (SKILL.md).\n
- Boundary markers: Not explicitly defined within the instructions.\n
- Capability inventory: Shell execution for githacker, git, and grep commands (SKILL.md).\n
- Sanitization: The skill mitigates environment risks by recommending Docker for containerized execution.
Audit Metadata