suggest-awesome-github-copilot-instructions
Fail
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches instruction templates and documentation from the official github/awesome-copilot repository.
- [COMMAND_EXECUTION]: Uses curl via a terminal tool to download content to the .github/instructions/ directory only after user confirmation.
- [PROMPT_INJECTION]: The skill processes untrusted data from external repositories and local context, presenting an indirect prompt injection surface.
- Ingestion points: Remote Markdown files from the awesome-copilot repository, local files in .github/instructions/, and chat history.
- Boundary markers: No specific delimiters or instructions are used to isolate external content from the agent's core logic.
- Capability inventory: Includes terminal execution (curl), file system writes, and resource fetching.
- Sanitization: External content is processed without explicit validation or escaping of embedded instructions.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata