manage-issue-analyze
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes external commands via
maestro delegateandbash. While the implementation correctly attempts to mitigate shell injection by writing the prompt to a temporary file (/tmp/iss-analyze-...) rather than passing it directly as a CLI argument string, the underlying data remains unvalidated. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection (Category 8) due to its handling of untrusted data from the
issues.jsonlfile. - Ingestion points: The skill reads
title,description, andcontextfields from.workflow/issues/issues.jsonlin Step 1. This file represents an external data source that could be influenced by malicious actors (e.g., via a bug report or feature request). - Boundary markers: The skill lacks explicit boundary markers or "ignore previous instructions" warnings when interpolating the issue description into the prompts for
spawn_agent(Step 2) andmaestro delegate(Step 3). - Capability inventory: The skill possesses significant capabilities, including
Bash(shell access),ReadandWrite(filesystem access), and the ability to orchestrate other agents (spawn_agent). A malicious instruction hidden in an issue title could potentially manipulate theBashcommand or influence theanalysisrecord written back to the filesystem. - Sanitization: While the
ISS-IDis validated against a strict regex, thetitleanddescriptionfields are used raw without sanitization, filtering, or escaping of potentially malicious LLM instructions.
Audit Metadata