coderabbit-incident-runbook
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Step 2 includes a command to delete branch protection rules using the GitHub API (
gh api ... --method DELETE), which disables essential repository security controls. - [COMMAND_EXECUTION]: Step 3 performs runtime execution of a Python script via
python3 -cto process configuration files. - [DATA_EXFILTRATION]: The skill uses
gh apito extract repository installation data, PR metadata, and lists of merged PRs, potentially exposing internal development metrics. - [DATA_EXFILTRATION]: Step 1 retrieves service availability info from CodeRabbit's official status page.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its data ingestion pipeline.
- Ingestion points: Reads
.coderabbit.yamland pull request metadata (titles and review status) from the repository (Step 3). - Boundary markers: Absent; the skill does not use delimiters or instructions to prevent the agent from obeying commands embedded in the processed data.
- Capability inventory: The skill has access to
gh apifor administrative writes,curlfor network access, andpython3for command execution. - Sanitization: Absent; there is no validation or escaping of the repository-sourced data before it is utilized by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata