code-review-assistant
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill's primary purpose is to read and process external source code (e.g., from pull requests), which is a classic Category 8 attack surface. Malicious instructions could be embedded in code comments or strings to hijack the agent's behavior.
- Ingestion points:
scripts/utils.pycontains logic to find and read local source files. - Boundary markers: No delimiters or explicit instructions are provided to help the AI distinguish between the skill's instructions and the content of the files being reviewed.
- Capability inventory: The skill enables the
Bashtool, which allows the agent to execute arbitrary system commands if successfully manipulated by an injection. - Sanitization: No sanitization or filtering is performed on the ingested file content.
- [Unverifiable Dependencies] (HIGH): The skill documentation and
CLAUDE.mdreference two primary executable scripts,scripts/analyze.pyandscripts/security_scan.py, which are not included in the provided skill files. These scripts are intended to be executed via Python, but their internal logic cannot be audited for safe handling of file paths or command injection vulnerabilities. - [Command Execution] (MEDIUM): The
Bashtool is enabled inSKILL.md. While used for legitimate purposes likegit diff, it provides a high-privilege execution environment that could be exploited if the agent is tricked via the aforementioned indirect prompt injection surface.
Recommendations
- AI detected serious security threats
Audit Metadata