gh-address-comments
Warn
Audited by Snyk on Feb 28, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's scripts/fetch_comments.py explicitly calls
gh api graphqlandgh pr viewto fetch PR conversation comments, reviews, and review threads (bodies) and SKILL.md requires the agent to read those comments and then "address" selected review comments, so untrusted, user-generated GitHub PR content can directly influence actions.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt explicitly asks the agent to run gh commands with "elevated network access" and to rerun auth checks with sandbox_permissions=require_escalated (i.e., bypass/raise sandbox permissions), which instructs the agent to bypass security/sandboxing even though it doesn't request sudo or system-file edits.
Audit Metadata