wf0-remote
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
tmuxto manage background execution environments (e.g.,wf-remote-<work-id>andwf-auto) that autonomously perform workflow tasks. - [PROMPT_INJECTION]: The skill contains a vulnerability surface for indirect prompt injection, particularly within its autonomous 'auto' and 'revision' workflows. • Ingestion points: Content is retrieved from external sources including GitHub Issue descriptions, Issue comments, and Pull Request review comments via the
ghCLI. • Boundary markers: There are no specific delimiters or instructions defined to prevent the agent from following directives embedded within the ingested external text. • Capability inventory: The skill possesses the ability to execute local command chains (e.g.,/wf1-kickoff,/wf0-nextstep), perform git operations (branching, pushing), and manage persistent background processes. • Sanitization: While the skill implements a collaborator permission check (restricting triggers toadmin,write, ormaintainroles), it does not perform sanitization or filtering of the actual content within those comments before incorporating it into the workflow logic.
Audit Metadata