changelog-automation
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides numerous command-line examples using
gitandgh(GitHub CLI) to extract repository data. These commands utilize shell features like command substitution$(...)and piping|to process output. This behavior is consistent with the skill's primary purpose of repository automation.- [EXTERNAL_DOWNLOADS]: The skill documentation recommends the installation ofgit-cliffviacargo installorbrew install. Whilegit-cliffis a well-known open-source tool for changelog generation, it is a third-party dependency not included in the trusted vendor list.- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes data from untrusted sources (commit messages and PR titles). - Ingestion points: Commit messages retrieved via
git logand Pull Request titles/labels fetched viagh pr listas described inSKILL.md. - Boundary markers: There are no boundary markers or delimiters defined in the command templates to differentiate between legitimate commit data and potentially malicious instructions embedded in commit messages.
- Capability inventory: The skill environment supports shell command execution (
git,gh,git-cliff) and network access via the GitHub CLI. - Sanitization: No sanitization, escaping, or validation is performed on the commit messages or PR titles before they are presented to the agent or output to files.
Audit Metadata