pr-review
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill possesses a high-risk attack surface by ingesting untrusted external data (Pull Request descriptions, commits, and code diffs).
- Ingestion points: Data enters the agent context through
WebFetch,Read, andgh pr diffcommands (SKILL.md). - Boundary markers: Absent; the skill provides no delimiters or instructions to help the agent distinguish between PR content and its own operational instructions.
- Capability inventory: The agent has access to
Bash,Task, andWebFetch, allowing for file modification, network communication, and system-level execution. - Sanitization: Absent; there is no validation or filtering of the content being read from the PRs.
- Remote Code Execution (HIGH): The workflow section (SKILL.md) explicitly instructs the agent to "Run checks
- Build, lint, test if applicable." Because the agent is granted
BashandTasktools, it is likely to execute build scripts (e.g.,npm install,make,pytest) provided within the untrusted pull request. An attacker could include malicious commands in these scripts to gain control over the agent's host environment. - Command Execution (HIGH): The skill provides the agent with powerful shell-access tools (
Bash,Task) and a mandate to execute commands based on the structure of the repository it is reviewing, which lacks the necessary sandboxing for handling untrusted third-party code.
Recommendations
- AI detected serious security threats
Audit Metadata