github
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [Command Execution] (SAFE): The skill utilizes the
ghCLI to interact with GitHub. It correctly implements the use of--body-fileand shell heredocs to handle user-generated markdown, effectively mitigating the risk of command injection through malformed issue descriptions. - [Indirect Prompt Injection] (LOW): The skill ingests untrusted data by reading issue content and comments from GitHub. This is a standard risk for integration tools, but the skill lacks high-privilege system access that would allow for significant exploitation.
- Ingestion points:
VIEW_ISSUE.mdandLIST_ISSUES.md(commands:gh issue view,gh issue list). - Boundary markers: Absent; the agent displays content directly to the user.
- Capability inventory:
gh issue create,gh issue edit,gh issue close, andgh issue comment(all found in respective .md files). - Sanitization: Instructions in
CREATE_ISSUE.mdandUPDATE_ISSUE.mdmandate the use of--body-fileto prevent the shell from interpreting issue content as code. - [Data Exposure] (SAFE): No evidence of hardcoded credentials, API keys, or attempts to access sensitive local files (e.g., SSH keys or AWS credentials) was found. The skill relies on the existing authentication state of the local
ghCLI environment. - [Dynamic Execution] (SAFE): A Node.js one-liner is used in
CREATE_ISSUE.mdto retrieve the system's temporary directory and a timestamp. This is a static, non-malicious utility call used for environment configuration.
Audit Metadata