shift
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it explicitly instructs the agent to "follow any instructions given in the PR description or comments" (Step 6). An attacker could place malicious instructions in a pull request that the agent might interpret as authoritative.
- Ingestion points: The skill fetches untrusted content using
gh pr view $ARGUMENTS --commentsin SKILL.md Step 1. - Boundary markers: None. The skill does not use delimiters or instructions to distinguish between system tasks and untrusted PR content.
- Capability inventory: The agent can execute shell commands (
composer,php artisan,gh), modify files in the local directory, and perform network operations via theghandcomposertools. - Sanitization: None. There is no logic to filter or validate instructions received from the PR metadata.
- [COMMAND_EXECUTION]: The skill executes several commands that run code defined within the repository, which could be malicious in a compromised or attacker-controlled pull request.
- Evidence:
composer updatecan execute arbitrary PHP scripts defined in thescriptssection ofcomposer.json. - Evidence:
php artisan testexecutes the application's test suite, allowing for arbitrary code execution in the context of the testing environment. - Evidence: The skill dynamically searches for and executes code fixers (Duster, Pint, or PHP CS Fixer) based on the contents of the project's
composer.json.
Audit Metadata