weekly-review
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (MEDIUM): The skill ingests untrusted data from GitHub commit messages and local journal files. An attacker could craft a commit message that, when summarized, influences the agent's behavior during the review process. \n
- Ingestion points: GitHub commit logs (via
ghtool), journal entries inmy-vault/, and project worklogs. \n - Boundary markers: Absent. The skill does not use delimiters or instructions to ignore embedded commands in the data it reads. \n
- Capability inventory:
Write,Edit, and restrictedBash. The agent can modify notes and memory files based on what it reads. \n - Sanitization: None. Data is read and summarized directly into the context.\n- Command Execution (LOW): The skill utilizes the
Bashtool to perform date calculations and fetch GitHub data. Security risk is mitigated by theallowed-toolsmetadata which restricts bash usage to theghanddatebinaries only, preventing arbitrary shell command injection.
Audit Metadata