gh-address-comments
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Privilege Escalation (HIGH): The skill explicitly instructs the agent to run commands with "elevated network access" and "escalated permissions." Specifically, it suggests using
sandbox_permissions=require_escalatedif blocked by security controls, which is a direct attempt to bypass environment restrictions. - Indirect Prompt Injection (LOW): The skill is designed to read and process external, untrusted content from GitHub PR comments, which could contain malicious instructions.
- Ingestion points:
scripts/fetch_comments.py(reads PR comments via GitHub API). - Boundary markers: None mentioned; instructions are treated as tasks to "Apply fixes."
- Capability inventory:
ghCLI execution and local file modification/fix application. - Sanitization: No evidence of sanitization or escaping of comment content before the agent interprets it to generate fixes.
- Command Execution (MEDIUM): The skill relies on executing the
ghCLI and a local Python script (fetch_comments.py) to interact with the system and remote repositories.
Recommendations
- AI detected serious security threats
Audit Metadata