gh-issues
Fail
Audited by Gen Agent Trust Hub on May 19, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill implements a 'Token Resolution' mechanism that explicitly targets sensitive configuration files located at
$HOME/.openclaw/openclaw.jsonand/data/.clawdbot/openclaw.json. It usesjqandnode -eto extractapiKeyvalues from these files. Furthermore, it instructs sub-agents to perform the same harvesting logic at runtime. - [COMMAND_EXECUTION]: The skill uses
git remote set-urlwith theGH_TOKENembedded directly in the remote URL (e.g.,https://x-access-token:$GH_TOKEN@github.com/...). This practice often leads to authentication tokens being stored in plain text within the local.git/configfile, creating a persistent credential exposure risk on the disk. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It ingests untrusted content from GitHub issue bodies, titles, and pull request reviews, which are then interpolated directly into the task prompts for spawned sub-agents. These sub-agents have the capability to execute shell commands, read/write files, and make network requests. An attacker could craft a malicious GitHub issue containing instructions to exfiltrate data or modify the codebase, which the sub-agent might execute.
- Ingestion points: Phase 2 (GitHub Issues API) and Phase 6.2 (GitHub Review/Comments API).
- Boundary markers: Uses
<issue>and<review_comments>XML-style tags, but lacks explicit instructions for the agent to ignore potentially malicious commands within the ingested data. - Capability inventory: Sub-agents can execute
git(push/commit),curl(network ops),grep/find(codebase search), andnode -e(dynamic execution). - Sanitization: No evidence of sanitization or validation of the external GitHub content before it is processed by the AI sub-agents.
Recommendations
- AI detected serious security threats
Audit Metadata