code-reviewer
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill instructs the agent to read PR descriptions and comments to 'understand the goal and history' (SKILL.md). This content is provided by external contributors and lacks sanitization or boundary markers. An attacker can embed instructions in these fields to override the agent's review logic or trick it into performing unauthorized actions.
- [Remote Code Execution] (HIGH): The 'Preparation' workflow for remote PRs involves checking out the PR and immediately executing
npm run preflight. Becausepreflightscripts are defined in the project'spackage.json, an attacker can submit a PR with a modifiedpackage.jsoncontaining malicious commands. These commands will execute with the user's privileges when the agent attempts to run the preflight check. - [Command Execution] (MEDIUM): The skill makes extensive use of shell commands (
gh,git,npm). While these are necessary for the skill's function, executing them on untrusted branches checked out from remote sources without a sandbox environment creates a high-risk surface for privilege escalation or system compromise.
Recommendations
- AI detected serious security threats
Audit Metadata