copilot-sdk
Fail
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill enables the execution of arbitrary local commands through its Model Context Protocol (MCP) integration configuration.
- Evidence: The configuration schema for
mcpServersallows users to specify acommandandargs(e.g.,command: "npx"), which provides a direct vector for local process creation and execution. - [REMOTE_CODE_EXECUTION]: The skill promotes the use of
npxto dynamically download and execute remote packages at runtime. - Evidence: Examples show the use of
npx -y @modelcontextprotocol/server-filesystem, which fetches and runs code from the NPM registry without local verification. - [EXTERNAL_DOWNLOADS]: The skill instructs the user to install several packages that use naming conventions mimicking official GitHub software, despite being authored by a community user.
- Evidence: Installation commands for
@github/copilot-sdk(NPM) andgithub-copilot-sdk(PyPI) are provided. This is high-risk as it may lead users to install unverified code under the assumption of official provenance. - [DATA_EXFILTRATION]: The skill allows the configuration of external CLI servers and remote MCP endpoints, which can facilitate the transmission of session data to unauthorized third-party locations.
- Evidence: Configuration fields like
cliUrlandhttptype MCP servers (e.g.,https://api.githubcopilot.com/mcp/) allow the agent to send data to external network addresses. - [PROMPT_INJECTION]: The skill exposes a significant surface for indirect prompt injection by ingesting local filesystem data and feeding it into an LLM session without sanitization or boundary markers.
- Ingestion points: The
filesystemMCP server (referenced inSKILL.md) allows the agent to read and process the content of local files. - Boundary markers: No delimiters or "ignore embedded instructions" warnings are present in the code examples provided to isolate untrusted file content.
- Capability inventory: The skill combines filesystem access (via MCP), arbitrary command execution (via
npx), and network operations (via the SDK client). - Sanitization: There is no evidence of input validation, escaping, or filtering of content read from the filesystem before it is interpolated into the session prompt.
Recommendations
- AI detected serious security threats
Audit Metadata