The vulnerability exists in the git_add function of the mcp-server-git package. The function's use of repo.index.add() from the GitPython library was insecure because it didn't prevent path traversal. An attacker could craft a request with file paths like ../../../../etc/passwd to add sensitive system files to the Git staging area. The patch, identified in commit 862e717ff714987bd5577318df09858e14883863, replaces the vulnerable call with repo.git.add("--", *files). This new implementation delegates the operation to the Git command-line interface, which correctly enforces repository boundaries and prevents the staging of files outside the working tree. The identified vulnerable function, mcp_server_git.server.git_add, is the exact location of this flawed logic and would be the function observed in a runtime profile during exploitation of this vulnerability.