sred-work-summary

Pass

Audited by Gen Agent Trust Hub on Mar 20, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: Uses the date command to identify the current year and the find command to locate local git repositories within the user's environment. These are standard, non-privileged operations used for local context retrieval.
  • [PROMPT_INJECTION]: The skill processes external data (PR titles, Notion docs, Linear tickets), which constitutes an indirect prompt injection surface.
  • Ingestion points: Content is read from GitHub PR titles/descriptions, Notion documents, and Linear tickets (SKILL.md Steps 4 and 6).
  • Boundary markers: No explicit delimiters or instructions are provided to the agent to treat this external data as untrusted.
  • Capability inventory: The skill can execute local shell commands, use the GitHub CLI/MCP, and write to Notion via MCP.
  • Sanitization: There is no specified sanitization or filtering of the content retrieved from external APIs before it is summarized.
  • [EXTERNAL_DOWNLOADS]: References an example Notion document on notion.so. This is a well-known service and the reference is for instructional purposes, involving no executable code.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 20, 2026, 03:40 AM