workflows
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill processes untrusted external content (workflow files) and has high-privilege write and execution capabilities, creating a significant attack surface.
- Ingestion points: The skill reads all files matching
.github/workflows/*.ymlduring its audit phase. - Boundary markers: There are no explicit markers or instructions to isolate the data in the YAML files from the agent's core instructions.
- Capability inventory: The skill is granted
Edit,Write,Bash(gh), andBash(git)tools, allowing it to modify code and interact with the GitHub API. - Sanitization: No evidence of sanitization or validation of the YAML content is provided before it is used to drive tool execution.
- Command Execution (LOW): The skill utilizes
Bash(gh)andBash(git)to perform its functions. While these are restricted to specific binaries, they are used to execute commands (likegh api) with parameters derived directly from untrusted workflow files (such as action tags and repository paths).
Recommendations
- AI detected serious security threats
Audit Metadata