connector-review

Warn

Audited by Gen Agent Trust Hub on Mar 29, 2026

Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill's 'Fix All Findings' workflow (Step 8b) instructs the agent to run make install_dev and make py_format within the repository context of the Pull Request being reviewed. If an attacker submits a malicious PR with a modified Makefile, these commands will execute arbitrary code on the runner. This behavior effectively bypasses the skill's own stated trust boundary: 'Never execute code from the PR'.
  • [COMMAND_EXECUTION]: The skill uses the gh CLI to interact with GitHub. In Step 6a, it fetches the current PR body and incorporates it into a shell command (gh pr edit) using a bash heredoc. If the agent fails to properly escape the untrusted content or if the shell expansion interacts with the content, it could lead to unintended command execution.
  • [PROMPT_INJECTION]: The skill processes untrusted input from PR diffs, descriptions, and code comments. While it employs mitigation techniques such as XML-style boundary markers and explicit instructions to ignore claims within the untrusted text, the skill's high level of autonomy (e.g., automatically fixing findings) makes it a potential target for indirect prompt injection attacks.
  • Ingestion points: Reads PR diffs via gh pr diff, PR descriptions via gh pr view, and various connector source files (metadata.py, client.py, etc.).
  • Boundary markers: Uses <untrusted-pr-content>, <external-content>, and <trust-boundary> tags to delimit untrusted data.
  • Capability inventory: Includes shell access (gh, make, python), filesystem read/write access, and the ability to update GitHub PR descriptions and comments.
  • Sanitization: Validates connector names and service types using the regular expression ^[a-zA-Z0-9_]+$ before use in file paths or shell commands.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 29, 2026, 06:21 PM