create-pr
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
gitandgh(GitHub CLI) tools to interact with the local repository and the GitHub API. This includes commands likegit log,git diff,gh issue view, andgh pr createwhich are necessary for its primary functionality. - [PROMPT_INJECTION]: The skill contains a directive to suppress tool attribution ('Do NOT include "Generated with Claude Code" or similar tool attribution footers'), which instructs the agent to hide its AI identity in external pull request descriptions.
- [PROMPT_INJECTION]: A surface for indirect prompt injection exists because the skill processes untrusted data from external sources.
- Ingestion points: The skill reads data from
git branch,gh issue list,gh issue view,git log, andgit diffinSKILL.md(Steps 1 and 2). - Boundary markers: Absent. The template does not use specific delimiters to isolate potentially malicious instructions embedded in commit messages or issue descriptions.
- Capability inventory: The skill possesses the capability to execute shell commands via
gh pr create(SKILL.md). - Sanitization: No explicit sanitization or validation of the ingested strings is performed before they are interpolated into the PR body template.
Audit Metadata