watch-ci
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface because it reads and summarizes output from
gh run view --log-failed, which can contain arbitrary text from CI logs controlled by the code being tested. - Ingestion points: External data enters the context via
gh run listandgh run viewoutput from the repository under test inSKILL.md. - Boundary markers: The instructions do not specify the use of delimiters to isolate the untrusted log data from the agent's system prompt.
- Capability inventory: The skill utilizes
Bash(forghandgittools) and theMonitortool to track run progress. - Sanitization: The skill does not describe any sanitization or validation logic for the content retrieved from the GitHub CLI.
- [COMMAND_EXECUTION]: The skill uses bash variables to store and interpolate user-provided arguments into shell commands. Specifically, parameters like
--branch,--sha, and--intervalare passed directly intoghcommands, which is a standard pattern that requires careful handling to prevent shell injection.
Audit Metadata