agent-reviewer
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Command Execution (MEDIUM): The
prehook (echo "👀 Reviewer agent analyzing: $TASK") interpolates the$TASKenvironment variable directly into a shell execution context. If$TASKcontains shell metacharacters such as backticks or command substitution ($(...)), it could lead to arbitrary command execution in the host environment where the hook runs. - Prompt Injection (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8) because its primary function is to ingest and process untrusted external code.
- Ingestion points: The
$TASKvariable in the pre-hook and the source code snippets provided to the agent for analysis. - Boundary markers: Absent; no delimiters or explicit instructions are provided to the agent to prevent it from following instructions embedded within the code being reviewed.
- Capability inventory: The agent has access to memory storage via the
memory_storehook and MCP tools (mcp__claude-flow__memory_usage), and code analysis tools (mcp__claude-flow__github_repo_analyze). - Sanitization: Absent; input is processed directly without escaping or filtering of potentially malicious instructions.
Audit Metadata