github-workflows
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Potential surface for indirect prompt injection.
- Ingestion points: Fetches live workflow syntax from
docs.github.comand reads GitHub Action logs/workflow statuses via theghCLI. - Boundary markers: Absent; no specific delimiters are used to wrap data retrieved from external documentation or repository logs.
- Capability inventory: Scripts have permissions to create and modify GitHub issues, labels, milestones, and projects via
PyGithubandghCLI. - Sanitization: Absent; the skill relies on standard API wrappers without additional sanitization of retrieved text before processing.
- [COMMAND_EXECUTION]: Orchestrates GitHub operations via subprocess calls to the
ghCLI. - Evidence:
github_project_setup.pyusessubprocess.runto callgh api graphqlwith queries constructed via string concatenation. While intended for legitimate project management, this pattern requires careful validation of input parameters. - [EXTERNAL_DOWNLOADS]: References external configuration and documentation from trusted sources.
- Evidence:
SKILL.mdretrieves workflow syntax from GitHub's official documentation and checks Node.js versions fromnodejs.org.
Audit Metadata