prd-to-github-milestone
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on the GitHub CLI (
gh) to perform repository management tasks. It executes commands such asgh issue list,gh issue create,gh issue edit, andgh apito synchronize the state of the local PRD with the remote GitHub repository. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests data from external PRD files and incorporates it into automated workflows.
- Ingestion points: The skill reads content from PRD markdown files (e.g.,
docs/PRD.mdortasks/prd-[feature].md) as specified in the Workflow section ofSKILL.md. - Boundary markers: The instructions lack explicit delimiters or instructions for the agent to ignore potentially malicious embedded prompts within the PRD content.
- Capability inventory: The agent has the capability to execute shell commands via the GitHub CLI (
gh), which includes creating issues, editing repository metadata, and making arbitrary API calls viagh apias documented inSKILL.md. - Sanitization: There is no evidence of input validation, escaping, or sanitization of the text extracted from the PRD before it is passed as arguments (e.g.,
--titleor--body) to theghtool.
Audit Metadata