github-traffic
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script executes the
gh(GitHub CLI) via thesubprocess.runmethod to interact with the GitHub API. This is a standard and safe implementation using a list of arguments to prevent shell injection. - [EXTERNAL_DOWNLOADS]: The skill fetches repository traffic data (views, clones, referrers) from GitHub's official API servers via the
ghcommand-line tool. These operations are performed against a well-known and trusted service. - [INDIRECT_PROMPT_INJECTION]: The skill ingests untrusted data from external sources, specifically referral URLs and page paths from the GitHub Traffic API, which are displayed to the user. While this represents a potential surface for indirect prompt injection if an attacker controls the traffic source names, the risk is inherent to traffic monitoring tools and the script does not perform dangerous operations with this data.
Audit Metadata