github-auto-star
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Command Execution (HIGH): The skill constructs and executes shell commands using the
ghCLI by interpolating project names and repository identifiers extracted from untrusted external sources (web articles, URLs, and screenshots) without any sanitization or escaping. - Evidence: Step 2 and Step 4 in
SKILL.mdshow the use ofgh search repos "项目名"andgh repo star owner/repowhere the variables are populated from external content. - Risk: An attacker can include shell metacharacters (e.g.,
;,|,`) in a webpage or image to execute arbitrary code on the user's machine. - Data Exposure & Exfiltration (HIGH): The skill requires a high-privilege
GITHUB_TOKENwith thereposcope to function. Combined with the command injection vulnerability, this sensitive credential is at high risk of being exfiltrated to an attacker. - Evidence:
config/.env.exampleandreferences/github-config.mdinstruct users to provide and export a token with full repository access. - Indirect Prompt Injection (LOW): The skill provides a significant attack surface for indirect prompt injection by ingesting untrusted third-party data to drive automated actions.
- Ingestion points: Web extraction via URLs and OCR text extraction from screenshots (
SKILL.mdStep 1). - Boundary markers: Absent. There are no delimiters or instructions to help the agent distinguish between data and malicious instructions.
- Capability inventory: The skill has the ability to execute shell commands, search GitHub, and modify the user's account (starring repos).
- Sanitization: Absent. The logic assumes extracted text is a valid project name and passes it directly to the system shell.
- Privilege Escalation (HIGH): The skill documentation recommends that users use
sudoto install dependencies, which is a high-privilege operation. - Evidence:
SKILL.mdrecommendssudo apt install ghfor Linux users.
Recommendations
- AI detected serious security threats
Audit Metadata