triage
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill executes
pnpm installandpnpm run dev|build|preview|teston reproduction projects provided by users via GitHub URLs, StackBlitz URLs, or manual steps. A malicious bug report could include harmful code inpackage.jsonscripts (e.g.,postinstall) or application logic that executes during reproduction. - [COMMAND_EXECUTION]: The skill uses several command-line tools to perform its tasks, including
gitfor cloning repositories,ghfor interacting with GitHub issues and pull requests,pnpmfor package management, andcurlfor fetching Gist data. - [EXTERNAL_DOWNLOADS]: The skill downloads content from external, well-known services to set up reproduction environments. This includes cloning from
github.comand downloading projects from StackBlitz usingstackblitz-clone. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection (Category 8) because it processes untrusted data from GitHub issue titles, bodies, and comments to guide the triage process.
- Ingestion points: Untrusted data enters via
issueDetails(fetched usinggh issue view) andissueTitle/issueBodyarguments inreproduce.md,diagnose.md, andverify.md. - Boundary markers: There are no explicit boundary markers or instructions to ignore embedded commands within the ingested issue data.
- Capability inventory: The skill possesses significant capabilities, including filesystem access, network operations (
curl,gh), and code execution (pnpm). - Sanitization: No sanitization or validation of the external GitHub issue content is performed before it is processed by the agent.
Audit Metadata