gitlab-skill
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill implements dynamic context injection via the
!syntax inSKILL.md, which triggers the execution ofscripts/gitlab_context.pyat load time. This script gathers pipeline information using configured GitLab tokens.\n- [COMMAND_EXECUTION]: The scriptscripts/get_gitlab_context.pyutilizessubprocess.runto call theglabCLI tool. It includes a security check usingshutil.whichto mitigate partial path vulnerabilities when locating the binary.\n- [DATA_EXFILTRATION]: Thescripts/validate_glfm.pyscript attempts to harvest aGITLAB_TOKENby reading the contents of~/.bashrc. Reading shell configuration files to extract credentials is a sensitive operation that poses a data exposure risk.\n- [EXTERNAL_DOWNLOADS]: Thescripts/sync_gitlab_docs.pyutility downloads documentation archives from the official GitLab repository (gitlab.com). This targets a trusted source and uses secure extraction methods with thefilter="data"flag in thetarfilemodule.
Audit Metadata