github-copilot
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (LOW): The skill recommends using
bash -cto executecurlcommands. This pattern is intended to preserve environment variables but introduces a potential shell injection surface if the agent populates placeholders (likeyour-org-nameorteam-name) with unvalidated data from external sources. - DATA_EXFILTRATION (SAFE): Network requests are directed exclusively to
api.github.com, which is a trusted domain for this context. The primary function of the skill is to transmit data to and from this API. - CREDENTIALS_UNSAFE (SAFE): Authentication is handled via the
GITHUB_TOKENenvironment variable, which is correctly declared as a secret in the skill's YAML frontmatter. Documentation examples use standard placeholders (ghp_xxxxxxxxxxxx). - INDIRECT_PROMPT_INJECTION (LOW): The skill processes data from GitHub API responses.
- Ingestion points: JSON responses from GitHub (e.g., list of seat assignments, usage metrics).
- Boundary markers: No explicit boundary markers or delimiters are used in the command templates for data interpolation.
- Capability inventory: File writing to
/tmpand execution of shell commands viabash -c. - Sanitization: No explicit sanitization or validation of API-returned data before it is used in subsequent CLI operations is defined within the skill itself.
Audit Metadata