devops-deployment
Warn
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/create-ci-pipeline.mdandscripts/create-docker-compose.mdutilize the!prefix to execute local shell commands (e.g.,grep,ls,test) on the host system. These commands are used to automatically detect project metadata such as language versions, dependencies, and test commands from files likepackage.jsonandpyproject.toml. - [EXTERNAL_DOWNLOADS]: The CI/CD templates and examples reference external GitHub Actions from well-known and trusted organizations. These include
actions/checkout,actions/setup-node,actions/setup-python,actions/cache,aquasecurity/trivy-action,aws-actions/configure-aws-credentials,aws-actions/amazon-ecr-login,snok/install-poetry, andcodecov/codecov-action. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) in its auto-detection scripts. Ingestion points: local project files (
package.json,pyproject.toml,Cargo.toml, etc.) are read via shell commands. Boundary markers: The skill does not employ delimiters or instructions to ignore embedded content in the read files. Capability inventory: The skill can write files to the local repository (.github/workflows/$ARGUMENTS.yml,docker-compose.yml) and execute shell commands via!. Sanitization: No evidence of escaping or validation is present for the data extracted from the project files before it is interpolated into the generated templates.
Audit Metadata