github-pr
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (MEDIUM): The
testandmergecommands inscripts/github-pr.pyautomatically execute package manager commands on code merged from untrusted remote Pull Requests. - Evidence: The
test()function callsrun([pm, "install"])andrun([pm, "run", "build"])after performing agit mergeof a remote PR head. - Risk: An attacker-controlled PR can include malicious
postinstallscripts inpackage.jsonor malicious logic in the build process, leading to full system compromise when the user runsgithub-pr testorgithub-pr mergewithout--no-install. - Context: Severity is set to MEDIUM because this is the primary functionality of the tool, but users must be aware that they are executing untrusted code.
- INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted metadata from GitHub PRs which is then displayed to the agent or user.
- Ingestion points:
get_pr_infoinscripts/github-pr.pyfetchestitle,author, andcommentsvia theghCLI. - Boundary markers: Absent. PR content is printed directly to the console in panels and tables.
- Capability inventory: The script has the capability to execute shell commands via
subprocess.runand modify the local filesystem viagitandnpm. - Sanitization: Absent. No filtering is performed on the PR title or metadata before display or processing.
- COMMAND_EXECUTION (SAFE): The script uses
subprocess.runwith list arguments, which effectively prevents traditional shell injection via therepoorpr_numberarguments. - Evidence:
run(["gh", "pr", "view", ...])andrun(["git", "fetch", ...])inscripts/github-pr.py.
Audit Metadata