ce-commit-push-pr
Warn
Audited by Snyk on Apr 28, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill explicitly runs GitHub CLI commands (e.g., gh pr view, gh pr diff) and its Pre-A / DU-3 steps state it "reads the current PR body" and resolves diffs/commits from PRs (references/pr-description-writing.md Step Pre-A and DU-3), meaning it ingests user-generated GitHub PR content (potentially public/forked) and uses that content to drive decisions and tool actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill explicitly runs git/gh commands at runtime (e.g., git fetch / gh pr diff against the repository remote such as https://github.com// or git@github.com:owner/repo.git) to load commit diffs and PR bodies which are then injected into the model's composition context, so remote repository content can directly control the agent's prompts and outputs.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata