code-review
Pass
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
glab(GitLab CLI) andgittools to perform operations on a self-hosted GitLab instance (https://gitlab-erp-pas.dedalus.lan). These operations include viewing merge requests, fetching diffs, and listing CI pipelines, which are necessary for the skill's stated purpose. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection where malicious instructions could be embedded in the data being processed.
- Ingestion points: The agent fetches and processes untrusted data such as merge request titles, descriptions, and code diffs using
glab mr viewandglab mr diff(documented inSKILL.md). - Boundary markers: The instructions lack explicit boundary markers or directives to the agent to ignore or isolate potentially malicious instructions contained within the fetched merge request content.
- Capability inventory: The skill has the capability to write back to the GitLab instance using
glab mr noteand the GitLab API to post discussions (documented inSKILL.md). - Sanitization: There is no mention of sanitizing or validating the content retrieved from GitLab before the agent interprets it.
Audit Metadata