ci-debug-workflow
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill performs a network connectivity check to a well-known service.
- Evidence:
references/ci-patterns.mdsuggests usingcurl -I https://registry.npmjs.orgfor network diagnostics. - Context: This targets the official npm registry, which is a well-known technology service, for standard diagnostic purposes.
- [COMMAND_EXECUTION]: The skill facilitates the execution of common developer tools for testing and reproduction.
- Evidence:
SKILL.mdandreferences/docker-debug.mdinclude instructions fornpm ci,npm test,docker build, anddocker run. - Context: These commands are necessary for the skill's functional goal of reproducing CI/CD environment failures locally.
- [DATA_EXFILTRATION]: The skill suggests commands that display environment configuration which may include sensitive data.
- Evidence:
references/ci-patterns.mdcontains the commandenv | sortto view the CI environment state. - Detail: While useful for identifying missing configuration, this command exposes all environment variables to the agent's context. In CI environments, these often contain secrets like API keys or tokens.
- [PROMPT_INJECTION]: The skill processes untrusted external data, creating a surface for indirect prompt injection.
- Ingestion points:
references/bug-thread-extraction.mddirects the agent to ingest content from GitHub issues and CI logs to extract reproduction steps. - Boundary markers: The skill does not define explicit delimiters or instructions to treat the ingested data as untrusted content.
- Capability inventory: The agent is granted shell execution capabilities (via
npmanddocker) to follow the extracted reproduction steps. - Sanitization: No sanitization or validation of the extracted instructions is implemented, meaning a maliciously crafted bug report could attempt to trick the agent into executing unintended commands.
Audit Metadata