Github Cli

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A token or expanded scope could let commands access or change private repositories, organization resources, or even enable repository deletion if the user grants that scope.

Why it was flagged

The skill documents use of the user's GitHub authentication, adding high-impact scopes, and printing the active token. This is expected for a GitHub CLI reference, but it exposes sensitive account authority if used carelessly.

Skill content
Auth: `gh auth login` or set `GH_TOKEN` env var ... `gh auth refresh -s delete_repo` ... `gh auth status --show-token` ... `gh auth token`
Recommendation

Only authenticate accounts and grant scopes that are needed for the current task. Avoid printing tokens unless explicitly necessary, and do not paste or store tokens in shared logs or conversations.

What this means

If an agent runs these commands without clear user intent, it could create, push to, or reconfigure repositories, and disabled prompts may reduce opportunities to catch mistakes.

Why it was flagged

The reference includes non-interactive configuration and commands that can mutate GitHub repositories. These are purpose-aligned examples, not hidden automation, but impactful use should be explicitly confirmed.

Skill content
`gh config set prompt disabled     # disable interactive prompts (good for scripts)` ... `gh repo create my-project --private --source=. --remote=upstream --push` ... `gh repo edit --default-branch main`
Recommendation

Require explicit user approval, confirm the target owner/repository, and keep prompts enabled unless the user specifically requests non-interactive scripting.