dotnet-gha-patterns
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references official and well-known GitHub Actions including
actions/checkout@v4,actions/setup-dotnet@v4,actions/cache@v4, andactions/upload-artifact@v4. These are trusted tools provided by the platform and are used according to security best practices. - [COMMAND_EXECUTION]: Example workflows demonstrate standard .NET CLI commands such as
dotnet build,dotnet restore, anddotnet test. These commands are integral to the primary purpose of the skill and do not involve untrusted inputs or risky execution methods. - [CREDENTIALS_UNSAFE]: The skill provides examples for managing sensitive information using GitHub Secrets (e.g.,
NUGET_AUTH_TOKEN,CONNECTION_STRING). It correctly demonstrates using placeholders and thesecrets: inheritkeyword, ensuring that credentials are not hardcoded but managed via the environment's native security features. - [PROMPT_INJECTION]: Analysis of the dynamic matrix generation pattern revealed a low-risk architectural surface:
- Ingestion points: Local
.csprojfiles are parsed viagrepandsedin a bash script. - Boundary markers: The logic is restricted to specific regex-based file extraction within the repository context.
- Capability inventory: Extracted values populate a GitHub Actions matrix for running
dotnet testjobs. - Sanitization: The script uses
jqto ensure extracted data is formatted as a valid, structured JSON array, preventing shell injection or data corruption.
Audit Metadata