githubbing
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/install-gh.shscript performs administrative operations, such as creating system directories in/etc/apt/keyringsand writing to/etc/apt/sources.list.d. - [EXTERNAL_DOWNLOADS]: Fetches an official GPG keyring from
cli.github.comto verify the authenticity of the GitHub CLI packages. - [COMMAND_EXECUTION]: Triggers system-wide package updates and installations using
apt updateandapt install gh, which modifies the environment's software state. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its ability to ingest untrusted data from GitHub repositories.
- Ingestion points: Data enters the context via the
ghtool when reading issues, pull requests, or repository content (as described inSKILL.md). - Boundary markers: There are no explicit boundary markers or instructions to ignore embedded commands when processing retrieved content.
- Capability inventory: The skill has the capability to write to repositories, access the network, and modify environment variables (
GH_TOKEN). - Sanitization: No sanitization or validation of the content retrieved from GitHub is performed before it is presented to the agent.
Audit Metadata