github-automation
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes Python and Bash examples that use the
subprocess.runmodule and shell commands to execute themcporterCLI. This allows the agent to perform GitHub operations through local command execution. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it is designed to read and act upon data from external GitHub sources, such as issue comments and file contents.
- Ingestion points: Data enters the agent's context through tools like
github.get_file_contents,searchCode, andsearchIssues. - Boundary markers: No explicit delimiters or instructions are provided to the agent to differentiate between GitHub data and system-level instructions.
- Capability inventory: The skill utilizes powerful capabilities including
Bashexecution, file writing, and the ability to push code to repositories viagithub.push_files. - Sanitization: The skill does not contain logic to sanitize or validate content retrieved from external sources before processing.
Audit Metadata