finishing-a-development-branch
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill executes shell commands defined by the project's environment (e.g.,
npm test,cargo test,pytest). If the repository being handled is untrusted, these commands can lead to arbitrary code execution via malicious scripts in files likepackage.json,Makefile, ortox.ini.- [PROMPT_INJECTION] (HIGH): The skill is highly susceptible to Indirect Prompt Injection (Category 8). Evidence: 1. Ingestion points: Reads repository contents and commit history to generate PR summaries. 2. Boundary markers: None identified to separate untrusted repo data from agent instructions. 3. Capability inventory: Significant capabilities including branch deletion (git branch -D), file transmission (git push), and interaction with external platforms (gh pr create). 4. Sanitization: None. An attacker could embed instructions in a commit message that the agent might follow when preparing the PR.- [REMOTE_CODE_EXECUTION] (MEDIUM): While it does not download direct shell scripts viacurl|bash, the reliance ongit pullfrom remote origins and the subsequent execution of local scripts creates a vector for RCE from compromised remote repositories.- [DATA_EXFILTRATION] (MEDIUM): Commands likegit pushandgh pr createtransmit local repository data to external services. If the agent is manipulated into including environment variables or secret files in the PR body (e.g., through Indirect Prompt Injection), this serves as an exfiltration path.
Recommendations
- AI detected serious security threats
Audit Metadata