bundle
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION] (HIGH): The core functionality of the skill is to upload local file content to a remote service (GitHub Gists). This creates a direct vector for data exfiltration. If an agent is targeted by indirect prompt injection, it could be coerced into uploading sensitive files like
.env,~/.ssh/id_rsa, or~/.aws/credentialsto a public or private gist. - [PROMPT_INJECTION] (HIGH): The skill implements an 'Indirect Prompt Injection' surface (Category 8). It ingests untrusted data (local source code and imports) and possesses high-privilege capabilities (network write via
gh gistand local file write). - Ingestion points: The script
bundle-file.shreads arbitrary files viacatand extracts strings viagrepandsed. - Boundary markers: None are present; the skill treats all file content as data to be bundled without isolation.
- Capability inventory: Execution of
ghCLI for network operations and shell redirection for file modification. - Sanitization: None detected; the script assumes file contents and names are benign.
- [COMMAND_EXECUTION] (MEDIUM): The provided shell scripts (e.g.,
bundle-file.shand the Gist Workflow snippets) use shell variable interpolation (e.g.,cat $FILE,cat "$resolved") without consistent quoting or validation. This could lead to local command execution if a project contains filenames with shell metacharacters like backticks or subshell expansions. - [CREDENTIALS_UNSAFE] (INFO): The documentation explicitly mentions
gh auth login, which handles authentication. While the skill doesn't hardcode credentials, it relies on the user's active GitHub session, which can be leveraged by the agent to perform actions on the user's behalf without further confirmation.
Recommendations
- AI detected serious security threats
Audit Metadata