endor-cicd
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The CI/CD templates for GitLab, Jenkins, Azure, Bitbucket, and CircleCI fetch the
endorctlbinary fromhttps://api.endorlabs.com/download/latest/endorctl_linux_amd64. The GitHub Actions template uses official actions from theendorlabsorganization. - [COMMAND_EXECUTION]: Generated configurations perform system operations including setting executable bits (
chmod +x), moving files to system paths (mv), and running the scanner. The CircleCI template usessudofor binary installation. - [REMOTE_CODE_EXECUTION]: The templates implement a workflow that downloads a remote binary and executes it within the user's CI/CD environment.
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8):
- Ingestion points: Reads project manifest files (e.g.,
package.json) and existing CI/CD configuration files to detect languages and build commands. - Boundary markers: None identified in the prompt templates to distinguish between template instructions and data extracted from user files.
- Capability inventory: The generated output contains shell commands and pipeline steps that execute on the user's build infrastructure.
- Sanitization: No explicit sanitization or validation of the extracted build commands or project settings is defined before interpolation into the configuration templates.
Audit Metadata