post-deploy
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell scripts located within the repository, such as
scripts/build-worker-image.shandevent-router.sh, based on file-matching rules. This allows for the execution of code that could be modified in a malicious PR. - [COMMAND_EXECUTION]: The
executor-verifyaction runsbash -non scripts identified in the PR's changed files list. While this is a syntax check, it involves processing paths derived from untrusted PR data. - [PROMPT_INJECTION]: The skill ingests untrusted data from GitHub PRs, specifically the
PR_TITLEandCHANGED_FILES, and interpolates them into shell command outputs and Markdown reports without sanitization or boundary markers. - [COMMAND_EXECUTION]: PR metadata and configuration from
CLAUDE.mdare used to build shell commands and summaries. Maliciously crafted PR titles or file names containing shell-sensitive characters could potentially interfere with command execution logic, such as theprintf '%b'expansion in the summary step. - [PROMPT_INJECTION]: Mandatory Evidence Chain for Indirect Prompt Injection:
- Ingestion points: PR metadata (title, file list) via
gh pr viewand team configuration fromCLAUDE.md. - Boundary markers: None. Untrusted data is directly echoed or written to files.
- Capability inventory:
Bash(shell execution),Write(report generation),Read(config and PR data). - Sanitization: None. The skill processes external metadata as raw strings.
Audit Metadata