mise-tasks
Warn
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill implements patterns for reading sensitive authentication tokens from the local filesystem to automate release and deployment processes.
- Evidence:
references/bootstrap-monorepo.mdandreferences/task-levels.mddescribe loadingGH_TOKENfrom~/.claude/.secrets/gh-tokenvia theread_filehelper. - Evidence:
references/patterns.mdcontains task definitions that executegh auth tokento retrieve credentials dynamically. - [REMOTE_CODE_EXECUTION]: The skill documents experimental functionality that allows for the inclusion of remote task configuration files from external URLs, which represents a potential remote code execution vector.
- Evidence:
references/advanced.mdillustrates theincludedirective:include = ["https://example.com/tasks.toml"]. - [PROMPT_INJECTION]: Task definitions utilize argument interpolation in shell scripts, creating a surface for indirect prompt injection or shell injection vulnerabilities.
- Ingestion points: User input is ingested through the
usageDSL defined inreferences/arguments.mdand stored in variables likeusage_<name>. - Boundary markers: The patterns provided do not include explicit sanitization or delimiters for these variables within the bash
runblocks. - Capability inventory: The skill relies on the
Bashtool and complexruncommands across multiple reference files for project automation. - Sanitization: No explicit escaping or validation logic for interpolated shell variables is demonstrated in the patterns.
- [COMMAND_EXECUTION]: The skill facilitates extensive command-line operations for tool management and CI/CD pipelines.
- Evidence: Frequent execution of tools such as
cargo,uv,pants,kubectl, andgitwithin automated task definitions.
Audit Metadata