cmd-pr-description
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted data from the repository's git history and diffs to generate descriptions. This constitutes an indirect prompt injection surface where malicious instructions embedded in commit messages or code comments could attempt to influence the agent's output.\n- Ingestion points: Results of
git diffandgit logexecuted inSKILL.md.\n- Boundary markers: None identified; the agent is not explicitly told to ignore instructions within the diff content.\n- Capability inventory: The skill can write to the local filesystem (PR_DESCRIPTION.md), interact with the system clipboard (pbcopy), and modify remote GitHub pull request metadata (gh pr edit).\n- Sanitization: No sanitization or filtering is performed on the ingested git data before it is processed by the model.\n- [COMMAND_EXECUTION]: The skill utilizes several shell commands to perform its tasks, includinggit,gh(GitHub CLI), and standard Unix utilities.\n- Commands are used to identify the base branch, calculate diff statistics, and retrieve commit logs.\n- The skill usesgh pr editto update remote repository state, although it correctly includes a human-in-the-loop check (AskUserQuestion) before execution.
Audit Metadata