gitea-workflow
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Prompt Injection] (LOW): The skill is susceptible to indirect prompt injection. It ingests untrusted data from Gitea (PR reviews, descriptions, and comments) and processes them to 'intelligently' determine implementation steps or apply fixes (e.g., in
apply-recommendations.md). An attacker could provide a malicious code review that the agent interprets as a directive. • Ingestion points:scripts/gitea-pr-checks.shandreferences/commands/apply-recommendations.md. • Boundary markers: Absent. • Capability inventory: Network access viacurl, local command execution vianpm,git, andtea. • Sanitization: JSON structure is validated viajq, but no sanitization of natural language instructions in content is present. - [Command Execution] (LOW): The skill frequently executes system commands including
git,npm, and theteaCLI to manage worktrees, run tests, and interact with the Gitea instance. This behavior is expected for a development tool but represents a capability tier that could be exploited if the agent's prompts are subverted. - [External Downloads] (LOW): The shell scripts
gitea-ci-status.shandgitea-pr-checks.shutilizecurlto fetch data from a user-configuredGITEA_URL. While targeted at the Gitea API, this involves external network communication with potentially untrusted payloads from the repository's PR metadata.
Audit Metadata