github-webhook-setup

Pass

Audited by Gen Agent Trust Hub on Feb 24, 2026

Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes shell commands to generate cryptographic secrets using openssl and manage Docker containers via docker compose. (SKILL.md, sections 3.1 and 3.2)
  • [CREDENTIALS_UNSAFE]: Reads and writes to the .env file located at /home/dawiddutoit/projects/network/.env to manage the WEBHOOK_SECRET. (SKILL.md, section 3.1)
  • [EXTERNAL_DOWNLOADS]: Uses curl to verify the reachability of the deployment health endpoint at https://webhook.temet.ai/hooks/health. (SKILL.md, section 3.2)
  • [PROMPT_INJECTION]: Establishes an attack surface for indirect prompt injection by processing external webhook payloads from GitHub.
  • Ingestion points: Incoming HTTP POST payloads from GitHub webhooks directed to the webhook service (SKILL.md, section 3.4).
  • Boundary markers: No specific delimiters or validation logic are implemented in the provided hook templates to isolate payload data from the execution context.
  • Capability inventory: The configuration allows for command execution via the 'execute-command' parameter in hooks.json (SKILL.md, section 3.3).
  • Sanitization: The skill lacks explicit sanitization steps for data extracted from the payload (e.g., repository.full_name) before use in deployment scripts.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 24, 2026, 05:23 PM