execute-review
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting untrusted data from task descriptions (via
agkan task list). - Ingestion points: Data enters the context from the
agkantool's task list output, specifically the task body containing the PR URL. - Boundary markers: Absent. There are no instructions to delimit the external data or to disregard embedded instructions within the task body.
- Capability inventory: The agent has the capability to execute shell commands using the
gh(GitHub CLI) andagkantools. - Sanitization: Absent. The skill does not define validation or sanitization logic for the extracted
<PR URL>or<id>before they are interpolated into shell commands. - [COMMAND_EXECUTION]: The workflow performs direct shell interpolation of variables (
<PR URL>and<id>) retrieved from external sources into command templates likegh pr view <PR URL>. Without explicit sanitization, this pattern is vulnerable to command injection if the input data contains shell metacharacters.
Audit Metadata