pr
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to executegh pr createandgh pr editcommands where the--bodyand--titlearguments are populated using data derived fromgit log,git diff, andgh pr view. This creates a shell injection vulnerability because these git outputs are untrusted and can contain shell metacharacters (e.g., backticks, semicolons, or quotes) that allow an attacker to break out of the intended command and execute arbitrary code on the host system.\n- [PROMPT_INJECTION]: The skill processes untrusted data from the repository's history and existing PRs to generate content, creating an indirect prompt injection surface.\n - Ingestion points: Data enters via
git log,git diff, andgh pr view --json body.\n - Boundary markers: No delimiters or instructions to ignore embedded commands are present when processing this data.\n
- Capability inventory: The skill has the ability to perform
git pushand modify pull requests viagh pr create/edit.\n - Sanitization: No validation or escaping of the extracted commit messages or PR bodies is performed before they are used in shell commands or prompt synthesis.
Audit Metadata