create-blog-post
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill performs a
git clonefromhttps://github.com/jim60105/blog.git. This repository is not on the trusted sources list, making the download a risk. - REMOTE_CODE_EXECUTION (HIGH): Following the repository clone, the skill executes
./switch-site.sh. Since the contents of this script are fetched from an external untrusted repository, this constitutes a remote code execution vector if the source repository is malicious or compromised. - COMMAND_EXECUTION (MEDIUM): The skill makes extensive use of system commands including
gitandgh(GitHub CLI). It performs operations such asgit pushandgh pr create, which require active credentials and can modify the state of remote repositories. - PROMPT_INJECTION (LOW): The skill is instructed to read guidelines from
.github/instructions/quill-sage.instructions.mdandAGENTS.mdwithin the cloned repository. These files represent an attack surface for indirect prompt injection that could alter the agent's behavior. - Ingestion points:
AGENTS.md,.github/instructions/quill-sage.instructions.mdinside the cloned repo. - Boundary markers: None specified for the read operations.
- Capability inventory: Shell execution (
./switch-site.sh), Git operations, GitHub PR creation. - Sanitization: No sanitization or validation of the fetched instructions is mentioned.
Recommendations
- AI detected serious security threats
Audit Metadata