GitHub About
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- DATA_EXFILTRATION (HIGH): The skill explicitly sources
~/.zshrcto load theGH_TOKEN. Shell configuration files like.zshrcare highly sensitive as they often contain numerous API keys, environment variables, and private aliases. Loading these into the active environment increases the risk of accidental or malicious exposure. - COMMAND_EXECUTION (MEDIUM): The skill performs multiple shell operations including
source,git remote,sedfor string parsing, andnode -efor JSON parsing. These operations are performed on data derived from the local file system. - PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8). It reads content from
README.md,package.json, and other project files to automatically generate a repository description. An attacker could embed malicious instructions in these files to trick the AI into including sensitive environment variables (from.zshrc) in the generated description sent to the public GitHub API. * Ingestion points:SKILL.md(Phase 2.2, 3.2, 4.2) identifiesREADME.md,package.json,pyproject.toml, and others as sources. * Boundary markers: Absent. No delimiters or instructions are used to prevent the agent from obeying instructions found within these files. * Capability inventory:gh repo edit --description,gh repo edit --homepage, andgh repo edit --add-topicprovide a path to exfiltrate data to GitHub. * Sanitization: Absent. The skill does not sanitize the content read from files before using it to generate API parameters.
Recommendations
- AI detected serious security threats
Audit Metadata