diff-review
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is highly vulnerable to shell injection. The user-supplied
<commit-hash>parameter is directly interpolated into shell commands (e.g.,git rev-parse --verify $COMMIT_HASH) and filename generation without any sanitization. An attacker providing a malicious hash like$(touch pwned)could execute arbitrary code on the host system. - [DATA_EXFILTRATION]: The skill generates report filenames using the unsanitized
<commit-hash>variable (e.g.,REPORT_FILE="diff-review-$(echo $COMMIT_HASH | cut -c1-7)..."). This allows for path traversal or arbitrary file write vulnerabilities, as a crafted input could potentially overwrite sensitive system files or write data to unintended directories. - [PROMPT_INJECTION]: The skill exhibits a significant indirect prompt injection surface by processing untrusted code diffs and injecting them directly into the prompts of multiple AI reviewers.
- Ingestion points: Git diff content obtained in
SKILL.md(Step 2) is injected into the{{DIFF_CONTENT}}placeholder inreviewers/claude-role.md,reviewers/codex-role.md, andreviewers/gemini-role.md. - Boundary markers: Absent. The diff content is simply appended to the end of the role instructions under a markdown header without isolation or escaping.
- Capability inventory: The skill possesses the ability to execute shell commands (
git,gemini,codex), write files to the local disk, and trigger sub-tasks via Claude Code (documented inSKILL.md). - Sanitization: Absent. There is no evidence of validation, escaping, or filtering applied to the code diffs or the user-provided parameters before they are used in prompts or shell commands.
Recommendations
- AI detected serious security threats
Audit Metadata