Appearance
SEC543 / MD-GH-REPO-TRANSFER-ALLOWED-TOOLS
SEC543 flags AI-native markdown frontmatter when allowed-tools or allowed_tools grants blanket GitHub repository transfer authority through gh repo transfer.
Why It Matters
gh repo transfer can move repository ownership across accounts or organizations. In shared skills or instruction frontmatter that is broader than most teams want to delegate by default.
Trigger Shape
- the file is a detected AI-native markdown instruction surface
- the path is not fixture-like
- frontmatter
allowed-toolsorallowed_toolscontains the exact tokenBash(gh repo transfer:*)
Clean Cases
- narrower read-only grants such as
Bash(gh repo view:*) - frontmatter without blanket repository transfer access
- fixture-like examples under test or fixture paths
Example Trigger
yaml
---
allowed-tools: Bash(gh repo transfer:*), Read
---Safer Example
yaml
---
allowed-tools: Bash(gh repo view:*), Read
---How To Fix
Remove shared gh repo transfer tool grants or replace them with narrower reviewed commands that keep repository transfer under explicit user control.