github-webhook-setup
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes shell commands to generate cryptographic secrets using openssl and manage Docker containers via docker compose. (SKILL.md, sections 3.1 and 3.2)
- [CREDENTIALS_UNSAFE]: Reads and writes to the .env file located at /home/dawiddutoit/projects/network/.env to manage the WEBHOOK_SECRET. (SKILL.md, section 3.1)
- [EXTERNAL_DOWNLOADS]: Uses curl to verify the reachability of the deployment health endpoint at https://webhook.temet.ai/hooks/health. (SKILL.md, section 3.2)
- [PROMPT_INJECTION]: Establishes an attack surface for indirect prompt injection by processing external webhook payloads from GitHub.
- Ingestion points: Incoming HTTP POST payloads from GitHub webhooks directed to the webhook service (SKILL.md, section 3.4).
- Boundary markers: No specific delimiters or validation logic are implemented in the provided hook templates to isolate payload data from the execution context.
- Capability inventory: The configuration allows for command execution via the 'execute-command' parameter in hooks.json (SKILL.md, section 3.3).
- Sanitization: The skill lacks explicit sanitization steps for data extracted from the payload (e.g., repository.full_name) before use in deployment scripts.
Audit Metadata