mastering-github-cli
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill creates a significant attack surface by fetching and processing untrusted data from external sources.
- Ingestion points:
scripts/wait-for-run.shingests workflow logs viagh run view --log-failed.scripts/find-repos-with-path.shandscripts/batch-search.shingest repository metadata and code snippets viagh search. - Boundary markers: No boundary markers or 'ignore' instructions are present when these external data sources are piped to the agent's context.
- Capability inventory: The skill allows the agent to execute
gh workflow run,gh pr create, andgh api, providing a path for an attacker to influence repository state if they can inject instructions into logs or file paths. - Sanitization: No sanitization or validation is performed on the data fetched from GitHub before it is presented to the agent.
- External Downloads (MEDIUM): The README instructs users to
pip install skilz, a third-party 'universal installer'. - Evidence: This tool is not from a verified trusted organization or repository list provided in the security protocols. Installing unverified package managers increases the risk of supply chain attacks.
- Command Execution (LOW): The skill frequently executes shell commands via
Bash. - Evidence: While the commands (primarily
ghandjq) are standard for the skill's purpose, the use ofevalor unsanitized variable interpolation in the provided scripts (e.g.,gh "${SEARCH_ARGS[@]}"infind-repos-with-path.sh) requires the agent to be cautious when generating inputs for these scripts.
Recommendations
- AI detected serious security threats
Audit Metadata