fix-issue
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface. It retrieves untrusted content from GitHub issues using the
gh issue viewcommand as seen inreferences/fix-phases.md. This content is directly interpolated into the prompts for specialized sub-agents (e.g.,debug-investigator,backend-system-architect) inreferences/agent-teams-rca.mdandreferences/fix-phases.md. These agents have access toBash,Write, andEdittools. No boundary markers or sanitization procedures are implemented to prevent malicious instructions embedded in issue descriptions from being executed. - [COMMAND_EXECUTION]: The skill implements a persistence mechanism via scheduled tasks. In
SKILL.md, it utilizes theCronCreatetool to periodically run thegh pr checkscommand to monitor pull request status. While serving a legitimate automation purpose, this establishes recurring shell command execution in the background. - [REMOTE_CODE_EXECUTION]: A hook configuration in
SKILL.mddefines aPreToolUsetrigger that executes a local script (run-hook.mjs) whenever theReadtool is invoked. This enables automated execution of JavaScript code during routine file read operations. - [EXTERNAL_DOWNLOADS]: The documentation in
SKILL.mdrecommends that the user globally install theportlesspackage vianpmto facilitate service discovery and visual debugging. This involves downloading and installing third-party software from an external registry.
Audit Metadata