github-images

Pass

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONNO_CODE
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes the GitHub CLI (gh) and curl to fetch issue metadata and download image files. This is standard behavior for interacting with GitHub's platform via the command line.\n- [EXTERNAL_DOWNLOADS]: Attachment downloads target private-user-images.githubusercontent.com, which is the official well-known domain for GitHub-hosted image attachments. This is documented neutrally as a trusted source.\n- [PROMPT_INJECTION]: The skill processes untrusted external content from GitHub issues and comments, creating a surface for indirect prompt injection.\n
  • Ingestion points: The skill fetches issue/PR bodies and comment HTML using the GitHub API (SKILL.md).\n
  • Boundary markers: Absent.\n
  • Capability inventory: Command execution via gh, curl, and the referenced ghimg utility.\n
  • Sanitization: Absent.\n- [NO_CODE]: The skill refers to a ghimg command throughout the documentation that is not provided as part of the skill source, although functional manual fallbacks using standard tools are included.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 27, 2026, 03:25 PM