gh-address-comments
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/fetch_comments.pywraps the GitHub CLI (gh) using Python'ssubprocessmodule. It invokes commands such asgh pr viewandgh api graphqlto programmatically retrieve pull request data. - [EXTERNAL_DOWNLOADS]: The skill relies on the presence of the
ghcommand-line tool. This is an official, well-known utility provided by GitHub for interacting with their platform. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection because it reads and acts upon PR comments provided by external users.
- Ingestion points: The script
scripts/fetch_comments.pyextracts text fromcomments,reviews, andreviewThreadsvia the GitHub GraphQL API. - Boundary markers: The PR data is passed to the agent as a JSON structure without explicit instruction-isolation markers.
- Capability inventory: The agent is tasked with applying code fixes based on these comments, which involves file-writing capabilities.
- Sanitization: No explicit sanitization of the comment body is performed before the agent processes it.
Audit Metadata