tools-repo-review
Warn
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
subprocessmodule to executegitandgh(GitHub CLI) commands for cloning, fetching, and listing repositories. It also scans the local filesystem at~/Codeto discover existing repositories. - [REMOTE_CODE_EXECUTION]: The Python script
repo_review_om.pydynamically importsmatplotlibwithin thecreate_dot_plotfunction. While used for optional visualization charts, this pattern involves dynamic loading of external code. - [PROMPT_INJECTION]: The skill has a high surface for indirect prompt injection as it processes untrusted data from external GitHub repositories.
- Ingestion points: Commit messages, author names, and code contents retrieved via
git logandgit cloneinSKILL.mdandscripts/repo_review_om.py. - Boundary markers: No explicit delimiters or 'ignore instructions' warnings are present when repository data is provided to the agent.
- Capability inventory: The skill can execute shell commands (
git,gh) and write files (CSV, PNG) to the local filesystem. - Sanitization: No sanitization of commit messages or repository code is performed before inclusion in the agent's context, potentially allowing malicious commit data to influence management outputs.
- [EXTERNAL_DOWNLOADS]: The skill clones repositories from GitHub using the
git clonecommand. This targets a well-known service (GitHub) and is documented as a safe operation for the skill's intended purpose.
Audit Metadata