ghp
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/create-milestone.pyusessubprocess.run(shell=True)to execute GitHub CLI commands. It constructs command strings by interpolating variables liketitle,label, andmilestonewithout proper shell escaping. This allows for arbitrary command injection if the input data (often derived from agent-planned tasks) contains malicious shell metacharacters. Although thebodyfield is escaped, other parameters remain vulnerable.\n- [EXTERNAL_DOWNLOADS]: The skill documentation (SKILL.md) requires the installation of multiple third-party GitHub CLI extensions:yahsan2/gh-pm,valeriobelli/gh-milestone, andjwilger/gh-issue-ext. These are external programs provided by unverified authors that execute with full user permissions, posing a supply chain security risk.\n- [PROMPT_INJECTION]: Workflows such as those incommands/fresh/SKILL.mdandcommands/work/SKILL.mdingest untrusted content from GitHub issues, comments, and PR descriptions usinggh issue view. The skill provides no instructions to use boundary markers or to ignore potential prompts embedded in the external content, making the agent susceptible to indirect prompt injection.\n- [COMMAND_EXECUTION]: Thecommands/init/SKILL.mdfile uses the!commandsyntax to perform dynamic context injection during skill initialization. While current commands are focused on repository metadata (e.g.,git remote,gh issue list), this mechanism automatically executes shell commands when the skill is loaded and could be exploited to run arbitrary code if manipulated.
Audit Metadata