requesting-code-review
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local git commands to retrieve commit hashes and code differences.
- Evidence:
SKILL.mdandcode-reviewer.mdcontain commands such asgit rev-parse,git diff --stat, andgit diffto identify the range of changes to be reviewed. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because it processes untrusted data (code changes) through an LLM subagent.
- Ingestion points: The subagent in
code-reviewer.mdreceives the output ofgit diff {BASE_SHA}..{HEAD_SHA}, which contains raw code and comments from the repository. - Boundary markers: The prompt template lacks explicit delimiters or specific instructions to the subagent to disregard natural language commands that might be present within the code being reviewed.
- Capability inventory: The skill utilizes the
Tasktool to dispatch subagents and executes shell commands via the terminal to gather git metadata. - Sanitization: There is no evidence of sanitization or escaping of the diff content before it is interpolated into the instructions for the reviewer subagent.
Audit Metadata