github-fix-ci
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill contains an indirect prompt injection surface due to the processing of external logs.
- Ingestion points:
scripts/inspect_pr_checks.pyfetches log content from GitHub Actions via thegh run view --logcommand. - Boundary markers: No boundary markers or 'ignore' instructions are used to separate untrusted log content from the agent's internal reasoning.
- Capability inventory: The skill executes the
ghCLI tool and, according to the workflow inSKILL.md, is intended to implement code fixes. - Sanitization: Log snippets are extracted and presented to the agent without sanitization or filtering of potential instructions.
- [COMMAND_EXECUTION]: The skill executes the GitHub CLI tool programmatically.
- The script
scripts/inspect_pr_checks.pyutilizessubprocess.runwith argument lists to invokegh. - This approach is a security best practice that prevents shell injection vulnerabilities by avoiding the use of
shell=Trueor string-based command assembly.
Audit Metadata