create-release-checklist
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): Potential shell injection vulnerability in Step 5 of the workflow. The instructions direct the agent to extract the
Package:andVersion:fields from a localDESCRIPTIONfile and interpolate them into the--titleargument of agh issue createcommand. If the project file is maliciously crafted to include shell metacharacters (e.g., backticks, command substitution, or unclosed quotes) and the agent does not perform strict sanitization, this could lead to arbitrary command execution on the user's system. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill exhibits an indirect prompt injection surface by ingesting untrusted data from local repository files (
DESCRIPTIONandNEWS.md). - Ingestion points:
DESCRIPTIONandNEWS.mdfiles read via theReadtool. - Boundary markers: None. The agent is not instructed to treat the file content as untrusted or delimited.
- Capability inventory: The agent has access to
Bash, which it uses to runRscriptandghCLI commands. - Sanitization: No sanitization or validation steps are defined before the extracted data is used in shell commands.
- [EXTERNAL_DOWNLOADS] (SAFE): The skill references standard, reputable development tools including the
usethisR package (a staple of R development) and the official GitHub CLI (gh). These are considered trustworthy sources for the intended use case.
Audit Metadata