cmd-pr-test-plan
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local system commands to retrieve repository context and build information. It uses
gh repo viewto determine the base branch andgit diffandgit logto extract change details. It also invokesgrepandmaketo discover available build targets and test runners within the project structure. - [PROMPT_INJECTION]: The skill has an indirect prompt injection attack surface because it ingests untrusted data from the repository and pull request context to generate the test plan.
- Ingestion points: Untrusted data enters the context through
git log(commit messages),git diff --name-only(file paths), and the contents of documentation files likeREADME.md,CONTRIBUTING.md, andAGENTS.md(project-specific instructions). - Boundary markers: There are no explicit delimiters or instructions provided to the agent to disregard or escape malicious prompts that might be embedded within the PR description, commit messages, or file contents.
- Capability inventory: The skill has the capability to execute shell commands (git, gh, make, grep) and write files to the repository root (
TEST_PLAN.md). - Sanitization: No evidence of sanitization, escaping, or validation of the strings extracted from the git environment or project files is present before they are interpolated into the prompt or the final output.
Audit Metadata