coderabbit-rate-limits
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Shell scripts in Step 2, 4, and 5 interpolate variables
$ORGand$REPOdirectly intogh apicommand strings. This pattern is susceptible to command injection if the organization or repository names provided by the user contain shell metacharacters (e.g.,;,`). - [COMMAND_EXECUTION]: The script in Step 5 uses a predictable file path in the shared
/tmpdirectory (/tmp/coderabbit-metrics-$ORG-$REPO.json). This is a common security weakness (CWE-377) that can be exploited in multi-user environments for symlink attacks or data tampering. - [PROMPT_INJECTION]: The skill facilitates indirect prompt injection by retrieving and processing data from external GitHub resources such as Pull Requests and Reviews.
- Ingestion points:
gh apicalls in SKILL.md (Step 2, 4, and 5) that fetch pull request metadata and review comments. - Boundary markers: No delimiters or instructions to ignore embedded commands are used when presenting the fetched data to the agent context.
- Capability inventory: The skill is granted
Bash,Write,Edit, andReadpermissions, creating a significant impact surface if the agent is manipulated. - Sanitization: While
jqis used for structural parsing of the JSON responses, the string content within the extracted fields is not sanitized or validated for malicious instructions.
Audit Metadata