address-gh-comments
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The instructions explicitly direct the agent to bypass security sandboxing and safety constraints.
- Evidence: In
gh-address-comments/SKILL.md, the instructions tell the agent to "Run allghcommands with elevated network access" and to usesandbox_permissions=require_escalatedif sandboxing blocks the GitHub CLI operations. - [COMMAND_EXECUTION]: The skill executes external system commands using the GitHub CLI tool.
- Evidence: The script
gh-address-comments/scripts/fetch_comments.pyuses thesubprocessmodule to run commands likegh auth status,gh pr view, andgh api graphql. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted data from GitHub PR comments to drive code changes.
- Ingestion points:
gh-address-comments/scripts/fetch_comments.pyextracts thebodyfield from PR comments, reviews, and threads. - Boundary markers: Absent. The agent is not instructed to use delimiters or to disregard instructions contained within the fetched comments.
- Capability inventory: The skill can execute CLI commands via
ghand is tasked with modifying source code to "Apply fixes" for the comments. - Sanitization: Absent. The agent is directed to apply fixes based directly on the raw text of the fetched comments.
Recommendations
- AI detected serious security threats
Audit Metadata