code-reviewer
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill executes
npm run preflightas part of the review workflow. This command runs scripts defined in the project'spackage.jsonfile. If an attacker submits a Pull Request that modifies thepreflightscript, the agent will execute the malicious commands upon checkout. - REMOTE_CODE_EXECUTION (MEDIUM): The combination of
gh pr checkoutfollowed bynpm run preflightallows for remote code execution. An attacker can craft a malicious PR that, when checked out and tested by the agent, executes arbitrary code on the host machine. - PROMPT_INJECTION (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8).
- Ingestion points: Untrusted data enters the agent's context through PR descriptions, comments, and the source code changes themselves.
- Boundary markers: Absent. The instructions do not specify any delimiters or safety prompts to prevent the agent from following instructions embedded in the PR data.
- Capability inventory: The agent has access to the local file system (
git), network tools (gh), and shell execution (npm). - Sanitization: Absent. There is no evidence of sanitization or validation of the PR content before it is read and processed by the agent.
Audit Metadata