github-operations
Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references and provides instructions for installing external components:
- Mentions the installation of the GitHub Copilot standalone binary from official GitHub sources (cli.github.com), which is a well-known service.
- References the third-party GitHub CLI extension
yahsan2/gh-sub-issuefor managing sub-issues inreferences/issue-management.md. - [COMMAND_EXECUTION]: The skill makes extensive use of the
Bashtool to executeghCLI commands and shell scripts. Example scripts inexamples/automation-scripts.mddemonstrate bulk operations, such as closing stale issues, syncing labels, and automating PR merges. These operations are within the stated scope of GitHub project management. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its core functionality:
- Ingestion points: The skill reads untrusted data from GitHub issue bodies, PR descriptions, and diffs using commands like
gh issue view,gh pr view, andgh pr diff(referenced inreferences/pr-workflows.mdandreferences/issue-management.md). - Boundary markers: There are no explicit instructions or delimiters defined to separate instructions from the data fetched from GitHub.
- Capability inventory: The agent has access to
Bash,Write,Edit, and theghCLI, allowing it to modify the repository or execute local commands based on processed data. - Sanitization: The provided example scripts do not implement sanitization or validation of the content retrieved from issue or PR fields before processing it in loops or scripts.
Audit Metadata