sred-work-summary
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: Uses the
datecommand to identify the current year and thefindcommand to locate local git repositories within the user's environment. These are standard, non-privileged operations used for local context retrieval. - [PROMPT_INJECTION]: The skill processes external data (PR titles, Notion docs, Linear tickets), which constitutes an indirect prompt injection surface.
- Ingestion points: Content is read from GitHub PR titles/descriptions, Notion documents, and Linear tickets (SKILL.md Steps 4 and 6).
- Boundary markers: No explicit delimiters or instructions are provided to the agent to treat this external data as untrusted.
- Capability inventory: The skill can execute local shell commands, use the GitHub CLI/MCP, and write to Notion via MCP.
- Sanitization: There is no specified sanitization or filtering of the content retrieved from external APIs before it is summarized.
- [EXTERNAL_DOWNLOADS]: References an example Notion document on
notion.so. This is a well-known service and the reference is for instructional purposes, involving no executable code.
Audit Metadata