validator-issue
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill reads local files including
.validator/config.yml,.debug.log, and.execution_state. The contents of these files are subsequently sent to an external GitHub repository (Codagent-AI/agent-validator) via theghCLI. While the instructions include a requirement for the agent to redact sensitive values like API keys and tokens, this relies on the model's reliability to identify and remove all sensitive information before transmission. - [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute several system commands: tail -n 50to read log files.mktempto create temporary files for the issue body.gh issue createto perform network operations and file data to GitHub.rm -fto delete temporary files.- [PROMPT_INJECTION]: The skill implements an '--auto-file' flag in the
$ARGUMENTSprocessing. When detected, it explicitly instructs the agent to skip the human-in-the-loop confirmation step (Step 4), which can lead to the automated exfiltration of data without final user review of the redacted content. - [INDIRECT_PROMPT_INJECTION]: The skill possesses a vulnerability surface for indirect injection:
- Ingestion points: Reads untrusted data from local log files (
.debug.log) and execution state files which may contain attacker-controlled content. - Boundary markers: No explicit boundary markers or delimiters are used when interpolating file contents into the draft issue body.
- Capability inventory: The skill has the capability to write to the network via
gh issue createand execute shell commands viaBash. - Sanitization: There is a manual instruction to redact sensitive values, but no programmatic sanitization or validation of the ingested content is performed before submission.
Audit Metadata