github-images
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONNO_CODE
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the GitHub CLI (gh) and curl to fetch issue metadata and download image files. This is standard behavior for interacting with GitHub's platform via the command line.\n- [EXTERNAL_DOWNLOADS]: Attachment downloads target private-user-images.githubusercontent.com, which is the official well-known domain for GitHub-hosted image attachments. This is documented neutrally as a trusted source.\n- [PROMPT_INJECTION]: The skill processes untrusted external content from GitHub issues and comments, creating a surface for indirect prompt injection.\n
- Ingestion points: The skill fetches issue/PR bodies and comment HTML using the GitHub API (SKILL.md).\n
- Boundary markers: Absent.\n
- Capability inventory: Command execution via gh, curl, and the referenced ghimg utility.\n
- Sanitization: Absent.\n- [NO_CODE]: The skill refers to a ghimg command throughout the documentation that is not provided as part of the skill source, although functional manual fallbacks using standard tools are included.
Audit Metadata