issue-discover
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to interact with the environment, specifically for executing GitHub CLI (gh) commands and running development tools such asnpx eslint,npx jest, andnpx tscfor verifying task completion. - [EXTERNAL_DOWNLOADS]: Fetches issue content and metadata from GitHub's official services using the
ghCLI tool. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection (Category 8) because it processes untrusted data from GitHub and local source code to drive its logic.
- Ingestion points: Analyzes GitHub issue bodies in
01-issue-new.mdand reads project source code files viaGlobandReadtools in02-discover.mdand03-discover-by-prompt.md. - Boundary markers: The skill uses markdown parsing to structure GitHub input but lacks explicit delimiters or instructions to ignore potential commands embedded in analyzed code or issue descriptions.
- Capability inventory: The agent has access to
Bashfor command execution andWrite/Editfor file modifications across the entire project scope. - Sanitization: Input from external sources is parsed for structure (e.g., expected/actual behavior) but is not sanitized to remove potentially malicious instructional content before being passed to subagents or used in task generation.
- [REMOTE_CODE_EXECUTION]: The Phase 4 'Quick Plan & Execute' logic (
04-quick-execute.md) automatically converts analysis findings into executable tasks. When 'Auto Mode' (--yes) is enabled, the agent may modify files and execute 'verification' commands (e.g., shell scripts or test runners) based on these findings. If the initial analysis was influenced by malicious code comments or issue descriptions, the generated remediation steps could include unintended or harmful operations.
Audit Metadata