跳转到主要内容
此内容尚未提供您的语言版本,正在以英文显示。

Agentic Actions Auditor

技能 已验证 活跃

Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference. Detects attack vectors where attacker-controlled input reaches AI agents running in CI/CD pipelines, including env var intermediary patterns, direct expression injection, dangerous sandbox configurations, and wildcard user allowlists. Use when reviewing workflow files that invoke AI coding agents, auditing CI/CD pipeline security for prompt injection risks, or evaluating agentic action configurations.

目的

To empower security professionals and developers to audit GitHub Actions workflows for AI agent security vulnerabilities, ensuring CI/CD pipelines are protected against prompt injection and other attack vectors.

功能

  • Detects prompt injection via direct expressions, env vars, and CLI fetches.
  • Identifies dangerous sandbox configurations and wildcard user allowlists.
  • Analyzes cross-file references for hidden AI agents.
  • Provides detailed remediation guidance for each attack vector.
  • Supports both local and remote repository analysis.

使用场景

  • Auditing a repository's GitHub Actions workflows for AI agent security.
  • Reviewing CI/CD configurations that invoke AI coding agents.
  • Evaluating agentic action configurations for security risks.
  • Assessing trigger events that expose workflows to external input.

非目标

  • Performing runtime prompt injection testing.
  • Auto-fixing or modifying workflow files.
  • Auditing non-GitHub CI/CD systems.
  • Reviewing standalone composite actions outside of a caller workflow context.

工作流

  1. Determine analysis mode (local or remote).
  2. Discover GitHub Actions workflow files.
  3. Identify AI action steps using `uses:` references.
  4. Capture security context (trigger events, env vars, permissions).
  5. Analyze for specific attack vectors (env var intermediary, direct injection, etc.).
  6. Report findings with detailed evidence, data flow, and remediation.

实践

  • Security Auditing
  • CI/CD Security
  • Prompt Injection Detection
  • Static Analysis

先决条件

  • GitHub CLI (`gh`) installed and authenticated
  • Access to the GitHub repository being audited

安装

请先添加 Marketplace

/plugin marketplace add trailofbits/skills
/plugin install agentic-actions-auditor@trailofbits

质量评分

已验证
99 /100
1 day ago 分析

信任信号

最近提交3 days ago
星标5.2k
许可证Apache-2.0
状态
查看源代码

类似扩展

Ship Gate

100

Pre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.

技能
alirezarezvani

Secrets Management

100

Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD environments.

技能
wshobson

Ci Cd Pipeline Builder

100

CI/CD Pipeline Builder

技能
alirezarezvani

Prompt Guard

100

Meta's 86M prompt injection and jailbreak detector. Filters malicious prompts and third-party data for LLM apps. 99%+ TPR, <1% FPR. Fast (<2ms GPU). Multilingual (8 languages). Deploy with HuggingFace or batch processing for RAG security.

技能
Orchestra-Research

Github Workflow Automation

99

Advanced GitHub Actions workflow automation with AI swarm coordination, intelligent CI/CD pipelines, and comprehensive repository management

技能
ruvnet

TradeMemory Protocol

100

Evolution Engine 的领域知识 — 支持 LLM 从原始 OHLCV 数据中自主发现策略。涵盖生成-回测-选择-进化循环、向量化回测、样本外验证和策略梯度。在发现交易模式、运行回测、进化策略或审查进化日志时使用。由“evolve”、“discover patterns”、“backtest”、“evolution”、“strategy generation”、“candidate strategy”触发。

技能
mnemox-ai