github-workflow-automation
Audited by Socket on Feb 16, 2026
1 alert found:
Security[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] The skill/documentation is broadly benign and coherent with its stated purpose of AI-assisted GitHub workflow automation, but introduces external data flows to AI services and broad permissions that require strong governance, data minimization, and manual approvals for high-risk paths. Focusing on least-privilege, explicit data filtering before sending prompts, removing sensitive content from logs, and adding approval gates for destructive operations will improve security. Recommended actions include tightening scopes, auditing data sent to AI services, and implementing mandatory reviews for deployment-risk workflows. LLM verification: Functional code for AI-driven automation is present and matches stated purpose. No explicit malicious payloads, hard-coded credentials, obfuscated code constructs, or reverse-shell behavior were found in the supplied fragment. The primary security concern is sensitive-data exfiltration: unredacted diffs and file contents are sent to an external AI provider (Anthropic) with no shown sanitization or allowlist/denylist. Additional risks stem from broad permissions (write access to PRs/issues, full