create-github-action
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to execute a local scaffolding script (scaffold_github_action.py). This script generates GitHub Action YAML files within the project's repository based on user-supplied parameters. - [EXTERNAL_DOWNLOADS]: The workflows generated by the skill reference various official and community GitHub Actions, such as
actions/checkout,actions/setup-python, andaquasecurity/trivy-action. These are standard, well-known resources within the GitHub Actions ecosystem and are used as intended for CI/CD automation. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through user-provided input.
- Ingestion points: User input collected during the 'Guided Discovery' phase in
SKILL.md, specifically the name of the workflow. - Boundary markers: Absent; there are no delimiters or instructions to the agent to treat the user-provided name as untrusted data.
- Capability inventory: The skill has the capability to write files to the
.github/workflows/directory via thescaffold_github_action.pyscript and theWritetool. - Sanitization: Absent; the
scaffold_github_action.pyscript performs direct string interpolation of the--nameargument into the YAML template without sanitizing for newlines or YAML control characters, allowing for potential structure manipulation.
Audit Metadata