requesting-code-review
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill creates a significant attack surface by ingesting untrusted content into a subagent's prompt. An attacker could embed malicious instructions within the source code being reviewed or the project requirements.
- Ingestion points: The template
code-reviewer.mdinterpolates{WHAT_WAS_IMPLEMENTED},{PLAN_OR_REQUIREMENTS},{DESCRIPTION}, and the output ofgit diffdirectly into the system instructions. - Boundary markers: None. There are no delimiters or 'ignore' instructions used to separate system instructions from the untrusted data being analyzed.
- Capability inventory: The skill executes local shell commands (
git rev-parse,git log,git diff). While the instructions show the subagent running these, the calling agent also performs command execution to populate the SHAs. - Sanitization: None detected. Content is interpolated directly into the prompt as raw text.
- Command Execution (LOW): The skill relies on executing
gitcommands on the local system. While these are standard for a code review tool, they represent an interaction with the local filesystem and shell environment that could be exploited if branch names or commit messages were crafted maliciously.
Recommendations
- AI detected serious security threats
Audit Metadata