managing-projects
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
sudoinSKILL.mdto perform system-level package installations and keyring management, which requires administrative access. - [COMMAND_EXECUTION]: The helper script
scripts/project-helpers.shemploys theevalcommand within itsexecute_with_retryfunction to execute dynamically constructed shell commands, a pattern that can lead to command injection if input parameters are not strictly sanitized. - [REMOTE_CODE_EXECUTION]: The functions
ensure_gh_cliandupdate_item_statusinscripts/project-helpers.shattempt to execute local shell scripts (ensure-gh-cli.sh,ensure-dependencies.sh, andgraphql-queries.sh) that are not present in the skill package, preventing a full audit of the execution flow. - [EXTERNAL_DOWNLOADS]: The skill performs downloads from
cli.github.comfor tool setup; this source is recognized as a well-known technology service. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from GitHub issue and pull request titles and states in
scripts/graphql-queries.shandscripts/project-helpers.sh. There are no boundary markers or explicit sanitization steps to prevent malicious content in these fields from influencing agent behavior.
Audit Metadata