reproduce-bug
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill processes untrusted data from GitHub issue descriptions and comments to drive its investigation logic.
- Ingestion points: The agent reads content from
$ARGUMENTS(GitHub issue number) and specifically looks at "issue description and comments". - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands within the issue text.
- Capability inventory: The agent can execute commands via
rails-console-explorer, navigate a browser via Playwright, and write comments back to GitHub. - Sanitization: Absent. The skill directly passes the
issue_descriptionto sub-tasks. - [Command Execution] (MEDIUM): The skill utilizes a
rails-console-exploreragent, which provides a high-privilege interface for executing arbitrary Ruby code within the application environment. - Evidence:
Task rails-console-explorer(issue_description)inSKILL.md. - Risk: If the
issue_descriptioncontains malicious instructions (see Indirect Prompt Injection), the agent might be tricked into executing destructive Ruby commands or modifying the database. - [Data Exfiltration] (LOW): The skill is designed to collect internal system information and screenshots, then post them to an external platform (GitHub).
- Evidence:
Phase 4: Report Backspecifies adding a comment to the GitHub issue with findings, screenshots, and relevant code. - Risk: While intended for debugging, there is a risk that sensitive production data, environment variables, or PII contained in logs or captured in browser screenshots could be inadvertently leaked to the public/shared issue tracker.
Audit Metadata