github-scrum
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data retrieved from GitHub Issues. Malicious instructions embedded in a feature description or acceptance criteria could influence the agent's behavior during sprint planning or refinement tasks.
- Ingestion points: Untrusted data enters the context via
mcp_github_github_issue_writeandgh issue createas shown inSKILL.md. - Boundary markers: The issue templates provided lack explicit delimiters or instructions to ignore embedded prompts within the user-provided fields.
- Capability inventory: The skill utilizes subprocess execution of the
ghCLI and various GitHub MCP tools to modify repository state. - Sanitization: No input validation, escaping, or sanitization is performed on user-provided strings before they are interpolated into the issue body markdown.
- [COMMAND_EXECUTION]: The skill relies on the
ghCLI as a fallback for operations such as pinning issues, creating milestones via the GitHub API, and managing labels. This involves executing shell commands that rely on the user's local authentication state. - [EXTERNAL_DOWNLOADS]: The project initialization process configures several GitHub Action workflows that utilize external dependencies, including
actions/labeler@v5,actions/stale@v9,release-drafter/release-drafter@v6, andtoshimaru/auto-author-assign@v2.1.1. These are established automation tools within the GitHub ecosystem.
Audit Metadata