linear
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Dynamic Execution] (MEDIUM): In
scripts/linear.ts, thelistIssuesfunction constructs GraphQL queries using direct string interpolation for thestateandassigneefilters. This is a security anti-pattern that could allow an attacker (or malformed input) to manipulate the GraphQL query structure. Using parameters/variables is the recommended safe practice. - [Data Exposure & Exfiltration] (LOW): The skill makes network requests to
https://api.linear.app, which is an external domain not on the pre-approved whitelist. While this is necessary for the skill's functionality, it involves transmitting a sensitive API key to an external service. - [Indirect Prompt Injection] (LOW): The skill processes untrusted data (issue titles, descriptions, and comments) from the Linear API and has the capability to write back to the API. This creates a surface for indirect prompt injection where malicious content in an issue could influence the agent's behavior.
- Ingestion points:
scripts/linear.tsvialistIssues,getIssue, andsearchIssuesfunctions fetching external data. - Boundary markers: Absent; the script returns raw JSON data to the agent without any delimiters or warnings to ignore embedded instructions.
- Capability inventory: The script can perform write operations, including
updateIssue(priority/state) andaddComment. - Sanitization: No sanitization or validation of the ingested data is performed before it is returned to the agent context.
Audit Metadata