finalize
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local shell commands using
gitand the GitHub CLI (gh) to view repository metadata, pull request details, and code differences. These are standard operations for a development-focused agent environment. - [PROMPT_INJECTION]: The skill processes external data from pull request descriptions via
gh pr viewand code diffs viagit diff. This represents an indirect prompt injection surface where adversarial content in code comments or PR metadata could attempt to influence the agent's logic. - Ingestion points: Data enters the context from
gh pr viewandgit diffoutputs as described inSKILL.md. - Boundary markers: No explicit markers or instructions to ignore embedded instructions are used when processing these inputs.
- Capability inventory: Across its scripts and instructions, the agent can execute shell commands (
git,gh) and invoke other skills (/ship,/split-and-ship,/polish-code). - Sanitization: No explicit sanitization, validation, or filtering of the ingested external content is defined.
Audit Metadata