backlog-connector
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
fetchBacklogIssuesfunction insrc/lib.tsconstructs a shell command by concatenating strings with theprojectIdvariable and executes it usingexecSync. SinceprojectIdcan be derived from unvalidated command-line arguments insrc/index.ts, an attacker could provide shell metacharacters (e.g.,;,&,|) to execute arbitrary system commands. - [CREDENTIALS_UNSAFE]: The skill is designed to read highly sensitive files from the user's personal and confidential tiers. It uses relative path traversal (
../../../) in its configuration files to accessknowledge/personal/connections/backlog.jsonandknowledge/confidential/connections/inventory.json, which bypasses directory restrictions. - [COMMAND_EXECUTION]: The skill transmits the
apiKeyas a query parameter in HTTP GET requests via bothaxiosandcurl. This is an insecure practice as API keys in query strings are commonly recorded in server logs, proxy logs, and network monitoring tools. - [PROMPT_INJECTION]: The skill ingests issue data (summaries and keys) from an external API and returns it to the agent without sanitization or boundary markers. This exposes the agent to indirect prompt injection if the issue content contains malicious instructions designed to manipulate the agent's logic.
Recommendations
- AI detected serious security threats
Audit Metadata