github-actions-pipeline-builder

Pass

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill references several official and well-known GitHub Actions from trusted organizations. Evidence: Use of actions/checkout, actions/setup-node, actions/cache, docker/setup-buildx-action, and slackapi/slack-github-action in SKILL.md and assets/workflows/full-stack-ci-cd.yml. Context: These are trusted, well-known services provided by GitHub and Docker; their use is standard practice and does not escalate the security verdict.
  • [COMMAND_EXECUTION]: The skill provides utility scripts and templates that involve local command execution. Evidence: scripts/action_usage_analyzer.ts and scripts/workflow_validator.ts read and analyze local workflow files. Context: All command execution is local and directly related to the skill's primary purpose of CI/CD pipeline management.
  • [PROMPT_INJECTION]: The skill contains tools that parse external data, creating a surface for indirect prompt injection. Ingestion points: Local workflow YAML files processed by scripts/action_usage_analyzer.ts and scripts/workflow_validator.ts. Boundary markers: None; the scripts parse the entire file structure. Capability inventory: Local file system read access and console output via analysis scripts. Sanitization: The tools use the yaml library for structural parsing, providing basic validation of the processed files. Context: The risk is categorized as low because the tools perform static analysis and do not execute the content of the parsed YAML files.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 6, 2026, 01:24 PM