handle-pr-feedback
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses GitHub CLI (
gh) and Git (git) to retrieve PR data, checkout branches, and push code modifications. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection via pull request review comments. The skill ingests untrusted data from
gh pr viewand GitHub APIs, then treats the content as instructions for code changes. - Ingestion points: Commands
gh pr view <number> --comments,gh api repos/{owner}/{repo}/pulls/<number>/reviews, andgh api repos/{owner}/{repo}/pulls/<number>/commentsinSKILL.mdingest external text. - Boundary markers: None provided; the agent is not instructed to disregard potential commands or malicious instructions within the comments.
- Capability inventory: Includes
git push, file system modification (making requested changes), and execution of local tests. - Sanitization: No validation or sanitization is performed on the ingested comment text before it is used to guide code tasks.
Audit Metadata