pageduty-oncall
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
authenticatefunction inscripts/pd-client.jsdirectly interpolates thePAGEDUTY_API_TOKENenvironment variable into a shell command string used withexecSyncwithout any escaping or validation. This allows for arbitrary command execution if the environment variable is configured with shell metacharacters. - [CREDENTIALS_UNSAFE]: The skill uses the
pd auth add --tokencommand, which typically causes the PagerDuty CLI to store the provided API token in a plain-text configuration file on the local file system (e.g.,~/.config/pagerduty/config.json). This results in persistent credential exposure. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it ingests untrusted data from PagerDuty incident titles, logs, and notes to generate an analysis report.
- Ingestion points: Incident titles, notes, and logs are fetched via
scripts/fetch-pd.jsand saved to the.pageduty-oncall-tmp/directory. - Boundary markers: None. The model is instructed to read the JSON files and produce a report without explicit delimiters or warnings to ignore embedded instructions.
- Capability inventory: The skill has access to
Bash,Read, andWritetools, providing a significant attack surface if the agent is manipulated. - Sanitization: There is no evidence of sanitization or filtering of the external incident content before it is processed by the LLM.
Audit Metadata