file-test-bug
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- DATA_EXFILTRATION (HIGH): The skill is explicitly designed to read local files (
agent-metadata.mdand test source code) and transmit their "complete, unmodified contents" to an external GitHub repository (microsoft/github-copilot-for-azure). - Evidence: Steps 4, 5, and 7 explicitly detail reading local file paths and using the
github-mcp-server-create_issuetool to post that data externally. - Risk: Integration test logs and metadata often contain sensitive environment variables, internal system paths, or PII that should not be posted to a public or team-wide repository without sanitization.
- PROMPT_INJECTION (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) because it ingests untrusted data from local files and uses it to drive external API actions.
- Ingestion Points:
tests/reports/junit.xml,agent-metadata.md, and local test source files. - Capability Inventory: Ability to create GitHub issues via
github-mcp-server-create_issue. - Sanitization: Explicitly absent. The skill instructs the agent to include "complete, unmodified contents" and "Do NOT summarize or truncate."
- Boundary Markers: Absent. There are no delimiters or instructions to the agent to ignore embedded commands within the files it reads.
- Attack Scenario: A malicious or compromised test run could generate a
junit.xmloragent-metadata.mdcontaining instructions that the agent would follow while preparing the issue, such as targeting a different repository or modifying the issue body to include other sensitive files (e.g.,~/.ssh/id_rsa).
Recommendations
- AI detected serious security threats
Audit Metadata