github
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes system commands through the
ghCLI andgitto manage repositories and GitHub Actions. - Evidence: Commands such as
gh run watch,gh pr checks, andgit pushare documented inREADME.mdandSKILL.mdas standard operational procedures. - Evidence: Troubleshooting instructions in
README.mdsuggest usinggit remote set-url origin https://${GITHUB_TOKEN}@github.com/username/repo.git, which places the authentication token in the remote URL, potentially exposing it in local configurations or command history. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting untrusted data from GitHub pull request review comments.
- Ingestion points: In
SKILL.md, thegh api graphqlcommand is used to fetch the bodies of review comments from external contributors. - Boundary markers: No delimiters or boundary markers are specified to isolate the external comment text from the agent's operational instructions.
- Capability inventory: The agent has broad capabilities including git operations (branching, pushing), workflow management via
gh, and arbitrary network requests viacurlwith theGITHUB_TOKEN(referenced inREADME.mdandSKILL.md). - Sanitization: Technical sanitization of the comment content is absent; the skill relies solely on the agent's ability to "critically evaluate each review comment."
Audit Metadata