issues-workflow
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill instructions in
SKILL.mdandreferences/graphql-queries.mddirect the agent to read sensitive GitHub tokens from~/.claude/.secrets/gh-token-terrylica. It specifically suggests usingcat ... | head -c 10to check the token type, which risks leaking parts of the credential into the agent's context or logs. - [COMMAND_EXECUTION]: In
references/auto-link-config.md, the provided TypeScript implementation for anonPostToolUsehook contains a command injection vulnerability. The code parses tool output using regular expressions and interpolates the resulting strings directly intoexecSynccalls without any validation or sanitization. - [PROMPT_INJECTION]: The skill features a 'Self-Evolving Skill' directive in
SKILL.mdthat instructs the agent to 'fix this file immediately' if issues are found. This pattern allows for persistence of behavior changes and could be abused by an attacker to override safety guidelines or inject malicious instructions into the skill's permanent configuration. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted data from external sources as a primary function, creating an attack surface for indirect prompt injection.
- Ingestion points: GitHub Issue titles, bodies, and comments retrieved via
gh issue listandgh issue viewcommands. - Boundary markers: None. The skill does not use delimiters or instructions to prevent the agent from following directions embedded in the issues it processes.
- Capability inventory: The skill has access to the
BashandWritetools, and it usesgh apito perform GraphQL mutations on repositories. - Sanitization: There is no mention of sanitizing or escaping the data retrieved from GitHub before it is used in subsequent command-line operations or PR creation.
Recommendations
- AI detected serious security threats
Audit Metadata