backlog-triage
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to the way it processes external data.
- Ingestion points:
scripts/triage-collect.jsfetches issue titles and bodies from GitHub repositories. - Boundary markers: The skill uses a two-phase process where Phase 1 generates a markdown report as an intermediate boundary before mutations occur in Phase 2.
- Capability inventory:
scripts/triage-apply.jscontains capabilities to execute destructive GitHub commands (gh issue close,gh issue edit) and post comments usingchild_process.execFileSync. - Sanitization: While
scripts/triage-report.jstruncates titles and snippets usingshortText, it does not sanitize the content to remove HTML comments (<!-- triage:... -->). An attacker could theoretically embed a malicious anchor in a GitHub issue that, if reflected into the report and accepted by the user/agent, would execute unintended mutations. - [COMMAND_EXECUTION]: The skill frequently executes external CLI tools to interact with the environment.
- Evidence:
scripts/triage-collect.jsandscripts/triage-apply.jsuseexecFileSyncto rungh(GitHub CLI) andgitcommands. - Context: This behavior is aligned with the skill's primary purpose of backlog management. The implementation includes argument quoting in
quoteShellArgto mitigate basic shell injection vulnerabilities.
Audit Metadata