generate-pr-description
Fail
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The shell command sequence defined in
SKILL.mdfor identifying the parent branch is vulnerable to command injection. It uses shell substitution$(...)to fetch the current branch name and injects it directly into agrepcommand within a pipeline. A maliciously named branch (e.g., containing semicolons or backticks) could result in arbitrary command execution when the agent runs this workflow. - [DATA_EXFILTRATION]: The
scripts/copy-to-clipboard.mjsscript reads a file path from command-line arguments and copies the file's entire content to the system clipboard. This functionality can be exploited to read sensitive files if the file path argument is manipulated, and the content is subsequently exposed to any application on the system with clipboard access. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted content from the repository's git history and branch names.
- Ingestion points: Commit messages retrieved via
git log, file diffs fromgit diff, and branch names are ingested into the LLM prompt to generate descriptions. - Boundary markers: The skill instructions do not specify any delimiters or special markers to separate the untrusted git data from the agent's core instructions.
- Capability inventory: The skill has the capability to execute shell commands (git operations), read and write files in the project root, and interact with the system clipboard.
- Sanitization: There is no evidence of sanitization or validation logic to detect or escape malicious instructions that an attacker might embed within commit messages or branch names.
Recommendations
- AI detected serious security threats
Audit Metadata