dig
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted data from the local file system and GitHub.\n
- Ingestion points: The skill reads source code using
Read,Glob, andGrep(in Step 1), and fetches GitHub issue data using theghCLI (in Step 3).\n - Boundary markers: There are no explicit instructions or delimiters defined to prevent the agent from following malicious instructions that might be embedded in the code or issues it analyzes.\n
- Capability inventory: The agent has access to powerful tools including
Bash(shell access),WebFetch(network access), andgh(GitHub interaction).\n - Sanitization: No sanitization or validation of the ingested content is performed before it is presented to the model or used to generate actions.\n- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute shell commands as part of its normal workflow.\n - Evidence: The instructions direct the agent to run
npm run build,gh issue list,gh issue edit, andgh issue create.\n - Context: While these commands are consistent with the skill's purpose as a developer tool, the use of shell execution with potentially unvalidated arguments (like issue search keywords) represents a broad capability.
Audit Metadata