cicd-integration
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the official
@anthropic-ai/claude-codepackage from a well-known registry and utilizes theanthropics/claude-code-actionGitHub Action from a trusted organization. - [PROMPT_INJECTION]: The skill documents patterns where untrusted data (pull request titles, descriptions, and file contents) is passed directly to the agent, creating a surface for indirect prompt injection.
- Ingestion points: CI/CD event data such as
${{ github.event.pull_request.title }}and repository files accessed at runtime. - Boundary markers: The templates lack explicit delimiters or instructions (e.g., 'ignore embedded commands') to separate user-provided data from agent instructions.
- Capability inventory: The skill uses tools with
Read,Grep,Glob,Write, andBashpermissions, which could be misused if the agent is influenced by malicious content in a PR. - Sanitization: There is no evidence of input validation or sanitization before data is interpolated into the agent's task prompts.
- [COMMAND_EXECUTION]: Provides a GitHub Action pattern using
github-scriptthat interpolates agent output directly into a JavaScript string literal (JSON.parse('${{ steps.claude.outputs.result }}')). This is a common but risky pattern that can lead to script failure or injection in the runner context if the agent output contains unescaped quotes or malicious code snippets.
Audit Metadata