github-ops
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/main.cjsutilizeschild_process.spawnSyncwith theshell: trueoption enabled. This configuration executes the GitHub CLI and its arguments through a system shell, which is vulnerable to command injection if arguments (such as repository names or file paths) contain shell metacharacters like;,&,|, or$(). - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it is designed to ingest and process data from external, potentially untrusted GitHub repositories.
- Ingestion points: Output from
gh apiand repository file contents fetched as described inSKILL.mdandtemplates/implementation-template.md. - Boundary markers: Absent; the skill does not implement delimiters or explicit instructions to the agent to ignore embedded commands within the fetched data.
- Capability inventory: The skill has the capability to execute shell commands via
scripts/main.cjsand perform file system operations via theReadtool. - Sanitization: The
hooks/pre-execute.cjsfile provides basic platform-specific path checks for Windows environments but lacks robust escaping or validation for shell-sensitive characters in the command arguments.
Audit Metadata