gh-address-comments
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill possesses a significant attack surface for indirect prompt injection via GitHub PR comments.
- Ingestion points: The
scripts/fetch_comments.pyscript retrieves thebodyfield ofcomments,reviews, andreviewThreadsfrom the GitHub GraphQL API. - Boundary markers: No delimiters or instructions are provided to the agent to treat this fetched content as untrusted data or to ignore embedded instructions.
- Capability inventory: While the fetching script only reads data, the instructions in
SKILL.mdcommand the agent to "Apply fixes for the selected comments." This grants the agent write and potentially execution capabilities on the local filesystem and codebase. - Sanitization: There is no evidence of sanitization, filtering, or validation of the comment content before it is processed by the agent to generate code changes.
- Privilege Escalation (LOW): The
SKILL.mdfile explicitly requestssandbox_permissions=require_escalatedand "elevated network access" for theghCLI. While documented as necessary forgh auth statusand API calls, this increases the potential impact of other vulnerabilities. - Command Execution (LOW): The Python script uses
subprocess.runto execute theghCLI. It uses a list-based argument structure and the GitHub CLI's-Fflag for variables, which is a secure practice that prevents traditional shell command injection.
Recommendations
- AI detected serious security threats
Audit Metadata