code-reviewer
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
🔴 VERDICT: CRITICAL
This skill instructs the agent to download and execute arbitrary code from external, unverified sources. Specifically, it uses gh pr checkout to download code from a GitHub Pull Request and then runs npm install and various npm run commands (build, test, lint, format:check).
gh pr checkout <PR_NUMBER>: This command downloads the code from a specified Pull Request. The content of a PR is user-generated and cannot be trusted. Executing this command places unverified external code into the agent's workspace.npm install: Whilenpmjs.comis a trusted registry, the packages themselves are user-submitted.npm installcan execute arbitrarypostinstallscripts defined within these packages. This is a known vector for supply chain attacks.npm run build,npm run test,npm run lint,npm run format:check: These commands execute scripts defined in thepackage.jsonof the downloaded or local project. These scripts can contain any shell command, leading to arbitrary command execution. A malicious actor could craft a PR or a local change withpackage.jsonscripts designed to exfiltrate data, establish persistence, or escalate privileges.
The combination of downloading unverified code and then executing arbitrary scripts from within that code constitutes a critical security vulnerability, allowing for complete compromise of the agent's execution environment.
Total Findings: 5
🔴 CRITICAL Findings: • Arbitrary Command Execution from Unverified Sources
- Line 23:
gh pr checkout <PR_NUMBER>• Arbitrary Command Execution from Unverified Sources - Line 26:
npm install• Arbitrary Command Execution from Unverified Sources - Line 27:
npm run build• Arbitrary Command Execution from Unverified Sources - Line 28:
npm run test• Arbitrary Command Execution from Unverified Sources - Line 29:
npm run lint• Arbitrary Command Execution from Unverified Sources - Line 30:
npm run format:check
ℹ️ TRUSTED SOURCE References:
• GitHub CLI (gh pr checkout)
- Line 23: While GitHub is a trusted platform, the content of a Pull Request is user-generated and untrusted. The execution of
gh pr checkoutfollowed bynpm runcommands on this untrusted content is the critical vulnerability. • npm registry (npm install) - Line 26: While npmjs.com is a trusted registry, the packages hosted there are user-submitted and can contain malicious
postinstallscripts. The execution ofnpm installon unverified project code is a critical vulnerability.
================================================================================
- AI detected serious security threats