github-automation
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it is designed to read and process data from external, potentially attacker-controlled sources on GitHub.
- Ingestion points: Data enters the agent's context through tools like
github.get_file_contents,searchCode,searchIssues, andgetPullRequestFilesas described inSKILL.md. - Capability inventory: The agent possesses powerful capabilities including
Bashaccess and the ability to modify repository states viamcporterandmcp__github__*tools. - Boundary markers: The skill does not implement delimiters or system-level instructions to ignore embedded commands within the fetched GitHub data.
- Sanitization: No sanitization or validation logic is present to filter malicious instructions out of Issue descriptions, PR comments, or code files before they are interpreted.
- [COMMAND_EXECUTION]: The skill includes Python and Bash code examples that demonstrate how to execute the
mcporterCLI tool using dynamic argument assembly. - Evidence: In
SKILL.md, a Python script usessubprocess.runto call the GitHub automation tool. If thepayloadobject is populated with unsanitized data from a user or an external GitHub source, it could lead to command injection or the execution of unintended API calls.
Audit Metadata