gh-cli-setup
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The skill provides the command
gh auth status --show-token. If an agent executes this, it will print the user's GitHub authentication token to the output, which could be logged or intercepted by the agent or a monitoring system. - [COMMAND_EXECUTION] (HIGH): The installation instructions for Linux involve using
sudoto write to system directories (/usr/share/keyrings/,/etc/apt/sources.list.d/) usingcurlanddd. This allows arbitrary system-level changes based on remote content downloaded at runtime. - [COMMAND_EXECUTION] (MEDIUM): The skill suggests modifying user shell profiles (
~/.bashrc,~/.zshrc) to alter thePATHenvironment variable. While common for manual setup, this is a persistence-adjacent technique that should be monitored for automated agents. - [EXTERNAL_DOWNLOADS] (HIGH): The skill downloads GPG keys and package lists from
cli.github.com. Since this domain is not on the explicit trusted source list provided in the security policy, these downloads are treated as high-risk unverifiable dependencies.
Recommendations
- AI detected serious security threats
Audit Metadata