pm
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute GitHub CLI (
gh) commands where user-provided inputs such as issue numbers (SUB_NUMBER,PARENT_NUMBER), descriptions, and search keywords are interpolated into shell strings. For example,gh api "repos/OWNER/REPO/issues/SUB_NUMBER"andgh issue list --search "keywords". Without explicit sanitization instructions, these points are vulnerable to command injection if a user provides a crafted payload (e.g.,42; rm -rf /). - [INDIRECT_PROMPT_INJECTION]: The skill reads and processes external data that could be attacker-controlled. Specifically, it reads issue specifications from
.dev/pm/specs/*.mdand surveys the codebase usingRead,Grep, andGlob. Malicious content within these files or code comments could influence the agent's classification, discovery, or drafting phases. - Ingestion points: Reads files via
Read,Grep, andGlobtools; parses.dev/pm/specs/*.mdfiles; fetches external content viaWebFetch. - Boundary markers: None identified in the instructions to separate untrusted data from agent instructions.
- Capability inventory: Significant capabilities including
Bash(gh:*),Write,Edit, andWebFetch. - Sanitization: No specific sanitization or validation steps are prescribed for the ingested content before it is used to drive the workflow.
- [DATA_EXFILTRATION]: The skill's primary workflow involves reading local repository content and sending it to GitHub as an issue body. While intended, this pattern can be abused to exfiltrate sensitive files, environment variables, or secrets if the agent is successfully injected or directed to include them in the
issue-body.mdfile.
Audit Metadata