wf0-promote
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple shell commands to perform its core functions.
- Uses
gh issue createto interact with GitHub. - Uses
jira-clito interact with Jira. - Performs file system operations including directory renaming (
mv). - Executes
git branchrenaming commands. - [CREDENTIALS_UNSAFE]: The skill is designed to access environment variables for configuration.
- Specifically looks for
JIRA_PROJECTandJIRA_DOMAINto configure the issue creation process. - [DATA_EXFILTRATION]: Local workflow data is transmitted to external platforms.
- Contents from
01_KICKOFF.md(Title, Goal, Success Criteria) are sent to GitHub or Jira as issue descriptions. - Local configuration and state are used to determine destination endpoints.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through local file content.
- Ingestion points: Data is read from
01_KICKOFF.mdandstate.json(specifically the 'Goal' and 'Success Criteria' sections). - Boundary markers: None. Content is extracted and used directly in command-line arguments.
- Capability inventory: The skill has the ability to read/write local files, rename directories/branches, and execute commands via the
ghandjira-clitools. - Sanitization: There is no evidence of sanitization or escaping of the content extracted from markdown files before it is passed as a string to the shell commands (e.g., as the body of a GitHub issue).
Audit Metadata