pr-automation
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [UNVERIFIABLE_DEPENDENCIES_AND_REMOTE_CODE_EXECUTION]: The skill executes
bun run lint:fixandbunx tscwithin a worktree created from the Pull Request's head branch. Because these commands are defined and controlled by the PR author through configuration files likepackage.jsonortsconfig.json, an attacker can submit a malicious PR that executes arbitrary code with the agent's privileges during the fix/rebase phase. - [INDIRECT_PROMPT_INJECTION]: The automation logic determines its next state by parsing PR comments that start with a specific bot signature (
<!-- pr-review-bot -->). Since the skill fetches these comments without verifying the author, a malicious contributor can post a crafted comment to trick the bot into merging a PR or moving it through the state machine incorrectly. - Ingestion points: PR comments retrieved via
gh pr view <PR_NUMBER> --json commentsinSKILL.md. - Boundary markers: The skill looks for
<!-- pr-review-bot -->and<!-- automation-result -->tags but lacks identity verification for the commenter. - Capability inventory: Powerful capabilities including
gh pr merge,gh pr edit,gh run approve, andgit push --force-with-leaseare present across the automation flow. - Sanitization: No sanitization or author validation is performed on the comment body before parsing the state results.
- [PRIVILEGE_ESCALATION]: The skill uses
gh run approveto manually trigger GitHub Actions workflows for PRs (including those from forks) where CI has not started. This action grants untrusted code the ability to run within the repository's CI environment, which could lead to resource abuse or secret exposure if the repository is not strictly configured. - [DATA_EXPOSURE_AND_EXFILTRATION]: Combined with the Remote Code Execution vulnerability, the skill's access to GitHub credentials and local repository data via the
ghandgitCLIs provides a clear path for an attacker to exfiltrate environment variables, API tokens, and sensitive source code.
Recommendations
- AI detected serious security threats
Audit Metadata