github-multi-repo
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill repeatedly utilizes
npx ruv-swarmacross multiple examples. This command downloads and executes a package from the npm registry that is not from a trusted organization, posing a significant risk of arbitrary code execution. - COMMAND_EXECUTION (MEDIUM): The skill performs
npm installon repositories cloned from the organization. A malicious repository could contain apackage.jsonwithpreinstallorpostinstallscripts, leading to the execution of attacker-controlled code when the agent attempts to update dependencies. - EXTERNAL_DOWNLOADS (LOW): The skill automates the bulk cloning of repositories and the retrieval of packages from external registries.
- PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8). It reads repository contents (like
package.json) and uses that data to drive high-privilege actions like creating Pull Requests and pushing code. Ingestion points:gh apiandgh searchin Examples 2, 3, and 5. Boundary markers: Absent; the agent processes raw repository content without delimiters. Capability inventory: File system access,git push,gh pr create, andgh issue create. Sanitization: None; the skill decodes base64 content and passes it directly tojqandgreplogic.
Recommendations
- AI detected serious security threats
Audit Metadata