github-actions
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill references official GitHub Actions (actions/checkout, actions/setup-python, actions/upload-artifact). Although the 'actions' organization is not on the explicit trusted list, these are industry-standard official tools and their use is the primary purpose of the skill.
- [PROMPT_INJECTION] (LOW): The workflow is configured to trigger on 'pull_request' events. This creates a surface for Indirect Prompt Injection where an external contributor could submit a PR with malicious code in tests or setup files that gets executed in the CI environment. Ingestion points: README.md (on: pull_request). Boundary markers: Absent. Capability inventory: pip install, pytest. Sanitization: Absent.
Audit Metadata