Agentic Actions Auditor
技能 已验证 活跃Audits GitHub Actions workflows for security vulnerabilities in AI agent integrations including Claude Code Action, Gemini CLI, OpenAI Codex, and GitHub AI Inference. Detects attack vectors where attacker-controlled input reaches AI agents running in CI/CD pipelines, including env var intermediary patterns, direct expression injection, dangerous sandbox configurations, and wildcard user allowlists. Use when reviewing workflow files that invoke AI coding agents, auditing CI/CD pipeline security for prompt injection risks, or evaluating agentic action configurations.
To empower security professionals and developers to audit GitHub Actions workflows for AI agent security vulnerabilities, ensuring CI/CD pipelines are protected against prompt injection and other attack vectors.
功能
- Detects prompt injection via direct expressions, env vars, and CLI fetches.
- Identifies dangerous sandbox configurations and wildcard user allowlists.
- Analyzes cross-file references for hidden AI agents.
- Provides detailed remediation guidance for each attack vector.
- Supports both local and remote repository analysis.
使用场景
- Auditing a repository's GitHub Actions workflows for AI agent security.
- Reviewing CI/CD configurations that invoke AI coding agents.
- Evaluating agentic action configurations for security risks.
- Assessing trigger events that expose workflows to external input.
非目标
- Performing runtime prompt injection testing.
- Auto-fixing or modifying workflow files.
- Auditing non-GitHub CI/CD systems.
- Reviewing standalone composite actions outside of a caller workflow context.
工作流
- Determine analysis mode (local or remote).
- Discover GitHub Actions workflow files.
- Identify AI action steps using `uses:` references.
- Capture security context (trigger events, env vars, permissions).
- Analyze for specific attack vectors (env var intermediary, direct injection, etc.).
- Report findings with detailed evidence, data flow, and remediation.
实践
- Security Auditing
- CI/CD Security
- Prompt Injection Detection
- Static Analysis
先决条件
- GitHub CLI (`gh`) installed and authenticated
- Access to the GitHub repository being audited
安装
请先添加 Marketplace
/plugin marketplace add trailofbits/skills/plugin install agentic-actions-auditor@trailofbits质量评分
已验证类似扩展
Ship Gate
100Pre-production audit that scans a codebase for security, database, deployment, code quality, AI/LLM, dependency, frontend, and observability issues. Intercepts deploy commands and blocks until critical items pass. Stack-agnostic. Use for "run ship gate", "am I ready to ship", "pre-launch audit", "can I deploy", "push to production", "go live checklist", "preflight check". Not for CI/CD setup or infra provisioning.
Secrets Management
100Implement secure secrets management for CI/CD pipelines using Vault, AWS Secrets Manager, or native platform solutions. Use when handling sensitive credentials, rotating secrets, or securing CI/CD environments.
Ci Cd Pipeline Builder
100CI/CD Pipeline Builder
Prompt Guard
100Meta's 86M prompt injection and jailbreak detector. Filters malicious prompts and third-party data for LLM apps. 99%+ TPR, <1% FPR. Fast (<2ms GPU). Multilingual (8 languages). Deploy with HuggingFace or batch processing for RAG security.
Github Workflow Automation
99Advanced GitHub Actions workflow automation with AI swarm coordination, intelligent CI/CD pipelines, and comprehensive repository management
TradeMemory Protocol
100Evolution Engine 的领域知识 — 支持 LLM 从原始 OHLCV 数据中自主发现策略。涵盖生成-回测-选择-进化循环、向量化回测、样本外验证和策略梯度。在发现交易模式、运行回测、进化策略或审查进化日志时使用。由“evolve”、“discover patterns”、“backtest”、“evolution”、“strategy generation”、“candidate strategy”触发。