invoking-github
Pass
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill interacts exclusively with
api.github.com, which is a well-known and trusted service for repository management. - [DATA_HANDLING]: The
read_filefunction inscripts/github_client.pyingests content from external GitHub repositories. While this content is added to the agent's context, the skill does not implement specific boundary markers or sanitization, creating a potential surface for indirect prompt injection if a user targets a malicious repository. - Ingestion points:
read_filefunction inscripts/github_client.py. - Boundary markers: Absent; content is returned as a raw string.
- Capability inventory: File writing and pull request creation via
commit_file,commit_files, andcreate_pull_requestinscripts/github_client.py. - Sanitization: Absent; content is not escaped or validated before processing.
- [COMMAND_EXECUTION]: The skill implementation relies on the standard
urlliblibrary for network operations and does not usesubprocess,os.system, or other shell execution vectors. - [CREDENTIALS_UNSAFE]: No hardcoded credentials were found. The skill provides clear instructions for users to manage their GitHub Personal Access Tokens securely using the platform's Project Knowledge feature.
Audit Metadata