performance-testing-review-ai-review
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted input from pull requests and interpolates it directly into LLM prompts, creating an indirect prompt injection surface.
- Ingestion points: The example Python orchestrator script (
ai_review.py) ingests code diffs and PR descriptions via thereviewer.get_pr_diff()function. - Boundary markers: The provided prompt templates (e.g.,
review_promptandsecurity_analysis_prompt) do not use specific delimiters or XML tags to isolate the untrustedcode_difffrom the core instructions. - Capability inventory: The skill is designed to execute system commands via
subprocessand perform network operations via the GitHub API and Anthropic SDK. - Sanitization: The provided code samples do not demonstrate any sanitization, filtering, or length-limiting of the ingested diff content before it is processed by the model.
- [COMMAND_EXECUTION]: The orchestration scripts rely on executing external CLI tools to perform static analysis and secret detection.
- Evidence: The Python script uses
subprocess.runto executesonar-scannerandsubprocess.check_outputto runsemgrep. The GitHub Action workflow executestrufflehogandsonar-scanneras shell commands. - Context: These executions are necessary for the skill's primary function but rely on the security of the underlying environment and the presence of verified binaries in the PATH.
Audit Metadata