requesting-code-review
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The
code-reviewer.mdtemplate is vulnerable to indirect prompt injection because it interpolates untrusted data into its instruction set without using delimiters or sanitization. - Ingestion points: The placeholders
{DESCRIPTION}and{PLAN_REFERENCE}incode-reviewer.mdare designed to ingest content from external sources such as project plans or task descriptions. - Boundary markers: No delimiters (like XML tags or markdown blocks) or instructions to ignore embedded commands are present to separate the untrusted data from the agent's core instructions.
- Capability inventory: The agent has the capability to execute shell commands (
git) and provide technical assessments that influence the development workflow. - Sanitization: There is no evidence of validation or sanitization of the content before it is interpolated into the prompt.
- [COMMAND_EXECUTION]: The skill uses local shell commands to perform Git operations required for code review.
- Evidence:
SKILL.mdandcode-reviewer.mdcontain commands such asgit rev-parse,git log, andgit diffwhich use variables (like{BASE_SHA}) to determine the range of code to be analyzed.
Audit Metadata