create-milestone
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a Python script using the
uvtool and interpolates user-provided variables{title},{description}, and{YYYY-MM-DD}directly into the shell command string. This creates a potential command injection vulnerability if the user provides input containing shell metacharacters.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection by ingesting data from external GitHub milestone lists which is used to influence the agent's logic.\n - Ingestion points:
backlog_list_milestones(state="open")inSKILL.md.\n - Boundary markers: None specified to prevent the agent from interpreting instructions contained within existing milestone titles or descriptions.\n
- Capability inventory:
uv runshell command execution andbacklog_create_milestonetool call inSKILL.md.\n - Sanitization: No explicit sanitization or escaping of the external milestone data is performed before processing.
Audit Metadata