bruhs
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill is installed via
npx skills add bryantleft/bruhs-skillsand usesnpxfor the Linear MCP server. These are necessary for the skill's stated purpose but involve fetching external resources. - [REMOTE_CODE_EXECUTION] (LOW): The
/bruhs spawncommand usespnpm createto scaffold projects, which downloads and executes remote templates. This is standard for development tools but constitutes runtime remote code execution. - [COMMAND_EXECUTION] (LOW): The skill performs extensive CLI operations using
gitandgh, including branch deletion and PR management. The risk is mitigated by the use ofAskUserQuestionto require human approval for destructive or significant actions. - [PROMPT_INJECTION] (LOW): The
/bruhs peepcommand fetches pull request comments from GitHub usinggh api. This creates a surface for Indirect Prompt Injection (Category 8). Evidence Chain: 1. Ingestion points: GitHub PR comments (external data). 2. Boundary markers: No explicit delimiters or warnings used when processing these comments. 3. Capability inventory: The agent has access to the filesystem, Git, GitHub CLI, and NPX. 4. Sanitization: No sanitization of comment content is documented before the agent processes them.
Audit Metadata