news
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill automates the storage of GitHub authentication tokens in plain text on the local filesystem.
- Evidence: Phase 4 executes a command to pipe the output of
gh auth tokeninto~/.git-credentials. - Risk: Storing credentials in plain text in a standard location like
~/.git-credentialsmakes them accessible to other processes or users on the system, increasing the risk of credential theft. - [COMMAND_EXECUTION]: The skill performs shell commands to modify global git configurations and push updates to a remote repository.
- Evidence: Uses
git config --global credential.helper storeandgit push origin mainin Phase 4. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it incorporates untrusted data from WebSearch results into its editorial process and final output.
- Ingestion points: News summaries, trending repository descriptions, and changelog data retrieved via 6 parallel sonnet subagents using WebSearch (Phase 1).
- Boundary markers: None. There are no instructions to the subagents or the editorial agent to ignore instructions embedded within the scraped content.
- Capability inventory: File writing (
news/{date}/index.html), Git commit, and Git push. - Sanitization: The skill lacks explicit sanitization or escaping of the retrieved web content before embedding it into the HTML structure of the newspaper edition, which could also lead to Cross-Site Scripting (XSS) in the generated pages.
Audit Metadata