automate-github-issues

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). No direct obfuscated payloads or hidden network exfiltration were found, but this skill grants external AI sessions (Jules) full repository access, uses repository secrets (JULES_API_KEY, GITHUB_TOKEN), dispatches agents that can modify code and produce PRs, and includes scripts/workflows that can automatically create/merge PRs — together this creates a high supply-chain/backdoor/credential risk if agents or prompts are malicious or compromised.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill fetches open, user-generated GitHub issues via scripts/github/issues.ts (Octokit) and feeds the resulting markdown into the Jules planner (scripts/fleet-plan.ts and scripts/prompts/analyze-issues.ts / bootstrap.ts), so the agent will read and act on untrusted third-party content.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 12:26 AM