code-review
Warn
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to use the
Shelltool to run various CLI utilities includinggit,gh(GitHub CLI), andcargo. These tools provide broad access to the local system and external repositories.\n- [REMOTE_CODE_EXECUTION]: Inreferences/rust/toolchain-setup.md, the instructions direct the agent to 'run all of these yourself' against the code under review, includingcargo testandcargo clippy. Executing tests or build processes on untrusted code (e.g., from a third-party GitHub PR) is a high-risk activity, as malicious projects can usebuild.rsscripts or test suites to execute arbitrary code on the host machine.\n- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection (Category 8) because it ingests and processes untrusted text from source code files and git diffs.\n - Ingestion points: Untrusted data enters the context via
git diff,gh pr diff, and theReadtool when scanning project files.\n - Boundary markers: The skill lacks explicit instructions or delimiters to prevent the agent from following 'instructions' embedded as comments or strings within the code being reviewed.\n
- Capability inventory: The agent has access to the
Shelltool, which could be exploited if an injection attack successfully manipulates the agent's behavior.\n - Sanitization: No sanitization or safety-filtering is performed on the ingested code content before it is processed by the LLM.
Audit Metadata