isolated-db-branches
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The provided templates for automation scripts and workflows contain a command injection surface where branch names are interpolated directly into shell strings. \n- Ingestion points: Branch names are ingested via
git rev-parse(intemplates/scripts/branch.ts) and${{ github.head_ref }}(intemplates/workflows/cleanup-neon-branch.yml). \n- Boundary markers: The templates do not use shell-escaping or proper quoting when passing variables to shell commands. \n- Capability inventory: The templates utilizenode:child_process.execSyncand GitHub Actionsrunsteps to execute commands withneonctlandpsql. \n- Sanitization: No validation or sanitization of branch names is performed in the templates, allowing potential execution of arbitrary commands if a branch name contains shell metacharacters.
Audit Metadata