endor-cicd

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The CI/CD templates for GitLab, Jenkins, Azure, Bitbucket, and CircleCI fetch the endorctl binary from https://api.endorlabs.com/download/latest/endorctl_linux_amd64. The GitHub Actions template uses official actions from the endorlabs organization.
  • [COMMAND_EXECUTION]: Generated configurations perform system operations including setting executable bits (chmod +x), moving files to system paths (mv), and running the scanner. The CircleCI template uses sudo for binary installation.
  • [REMOTE_CODE_EXECUTION]: The templates implement a workflow that downloads a remote binary and executes it within the user's CI/CD environment.
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8):
  • Ingestion points: Reads project manifest files (e.g., package.json) and existing CI/CD configuration files to detect languages and build commands.
  • Boundary markers: None identified in the prompt templates to distinguish between template instructions and data extracted from user files.
  • Capability inventory: The generated output contains shell commands and pipeline steps that execute on the user's build infrastructure.
  • Sanitization: No explicit sanitization or validation of the extracted build commands or project settings is defined before interpolation into the configuration templates.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 04:25 AM