github-actions-pipeline-builder
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references several official and well-known GitHub Actions from trusted organizations. Evidence: Use of actions/checkout, actions/setup-node, actions/cache, docker/setup-buildx-action, and slackapi/slack-github-action in SKILL.md and assets/workflows/full-stack-ci-cd.yml. Context: These are trusted, well-known services provided by GitHub and Docker; their use is standard practice and does not escalate the security verdict.
- [COMMAND_EXECUTION]: The skill provides utility scripts and templates that involve local command execution. Evidence: scripts/action_usage_analyzer.ts and scripts/workflow_validator.ts read and analyze local workflow files. Context: All command execution is local and directly related to the skill's primary purpose of CI/CD pipeline management.
- [PROMPT_INJECTION]: The skill contains tools that parse external data, creating a surface for indirect prompt injection. Ingestion points: Local workflow YAML files processed by scripts/action_usage_analyzer.ts and scripts/workflow_validator.ts. Boundary markers: None; the scripts parse the entire file structure. Capability inventory: Local file system read access and console output via analysis scripts. Sanitization: The tools use the yaml library for structural parsing, providing basic validation of the processed files. Context: The risk is categorized as low because the tools perform static analysis and do not execute the content of the parsed YAML files.
Audit Metadata