GitLab CI/CD pipeline configuration and GLFM documentation expertise. Use when modifying .gitlab-ci.yml, optimizing pipelines, testing with gitlab-ci-local, writing GitLab README/Wiki content, configuring Docker-in-Docker workflows, or implementing CI Steps composition.
79
75%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/gitlab-skill/skills/gitlab-skill/SKILL.mdSecurity
1 medium severity finding. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The skill explicitly loads and validates remote, user-authored GitLab content (e.g., Execution Protocol step 1 running scripts/sync-gitlab-docs.py to update docs from the official repository, scripts/gitlab_context.py which calls the GitLab API, and the CI Steps docs/examples that load steps from git/gitlab.com or arbitrary URLs like gitlab.com/... and https://...), so untrusted third‑party repository/page content is fetched and used to influence validation and pipeline behavior.
11ec483
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.