qe-github-project-management
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill utilizes
npxto dynamically download and execute packages such asclaude-flow@alphaandruv-swarmfrom the public npm registry. These packages are not from the provided list of trusted vendors. - [REMOTE_CODE_EXECUTION]: The extensive use of
npxfor core functionality (e.g.,npx ruv-swarm github board-init) constitutes remote code execution, as the agent fetches and runs code from an external repository at runtime. - [COMMAND_EXECUTION]: The skill automates numerous shell-based operations using the GitHub CLI (
gh) to modify repository states, manage project boards, and post comments. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection attacks because it ingests untrusted content from GitHub issues and comments.
- Ingestion points: External data is fetched via
gh issue viewandgh issue list(e.g., inSKILL.md). - Boundary markers: There are no visible delimiters or security instructions used to prevent the agent from obeying commands embedded within the fetched issue body.
- Capability inventory: The skill has the ability to write to the repository, create/edit issues, and execute further shell commands via
npxandghCLI. - Sanitization: No sanitization or filtering is applied to the
$ISSUE_DATAor$ISSUE_BODYvariables before they are passed into the swarm processing tools.
Audit Metadata