aif-review
Warn
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Potential command injection in git and github-cli tool usage. The skill instructions direct the agent to execute shell commands using unquoted user-supplied arguments such as
git rev-parse --verify <argument>,gh pr view <number>,gh pr diff <number>, andgit log <ref>..HEAD. If the user input contains shell metacharacters and the execution environment does not provide automatic sanitization, this could lead to arbitrary command execution. - [PROMPT_INJECTION]: The skill facilitates indirect prompt injection by instructing the agent to read and prioritize project-local instructions. It mandates reading
.ai-factory/skill-context/aif-review/SKILL.mdand explicitly states that project-specific rules in this file should win over the skill's general instructions. This creates a mechanism for a malicious repository to hijack the agent's behavior during the review process. - Ingestion points:
.ai-factory/skill-context/aif-review/SKILL.md(via theReadtool) and repository content (viagit diffandgh pr diff). - Boundary markers: Absent. The skill provides no instructions for using delimiters or ignoring embedded instructions in external data.
- Capability inventory:
Bashtool usage (restricted togitandghsubcommands), file system access (Read,Glob,Grep), and user interaction (AskUserQuestion). - Sanitization: Absent. There is no requirement for the agent to sanitize or validate the content of the project-level rules or the code being reviewed.
Audit Metadata