Git Manager

WarnAudited by ClawScan on May 10, 2026.

Overview

This Git skill has a legitimate purpose, but it runs an unreviewed hard-coded helper through an unsafe shell command and can perform high-impact Git changes without clear confirmation safeguards.

Review carefully before installing. Only use this skill if the shell execution is fixed, the helper scripts are included and reviewable, and commit/push actions require explicit confirmation after showing status and diff.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A crafted or poisoned input could make the agent run unintended local commands under the user's account, not just Git operations.

Why it was flagged

The command is executed through a shell, while arguments are built from input fields such as action, repo, message, files, and branch without shell-safe escaping.

Skill content
exec(`"${path}" ${args.join(" ")}`, { maxBuffer: 1024 * 1024 }, ...)
Recommendation

Use execFile or spawn with an argument array, validate allowed actions and paths, and avoid shell interpolation for user-controlled values.

What this means

The skill may fail on other systems or, if that path exists, execute code that was not part of the reviewed package.

Why it was flagged

The runtime delegates execution to a developer-specific absolute path that is not included in the provided file manifest or install spec.

Skill content
const path = "/Users/nico/.openclaw/workspace/skills/git-manager/scripts/git-manager";
Recommendation

Package all executable helpers with the skill, use relative paths, declare install requirements, and avoid executing unreviewed absolute-path files.

What this means

The agent could publish unintended changes or sensitive files to a remote repository if the user expected only a local commit or status check.

Why it was flagged

The documented workflow can stage all changes, commit, and push to a remote repository in one chain, without showing an explicit confirmation step or file-by-file review.

Skill content
# The skill will: git add . && git commit -m "style: improve login page" && git push
Recommendation

Require an explicit status/diff review and user confirmation before staging all files, committing, or pushing; default high-impact operations to dry-run.

What this means

The skill can make authenticated changes to repositories that the user's Git credentials can access.

Why it was flagged

Push and pull operations will use the user's existing Git credentials or SSH keys for remote repository access.

Skill content
SSH keys must be pre-configured for push/pull
Recommendation

Use limited-scope repository credentials where possible and confirm the target remote and branch before push or pull operations.

What this means

Local logs could retain project details or commit information longer than expected.

Why it was flagged

The skill says it keeps persistent local logs of operations, which may include repository paths, branch names, commit messages, file names, or raw Git output.

Skill content
All operations logged to `~/.openclaw/logs/git-manager.log`
Recommendation

Review or configure the log path, avoid putting secrets in commit messages, and clear logs when working with sensitive repositories.