pr-description-generator
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
generate.jsscript is vulnerable to shell command injection because it constructs git commands by directly interpolating unsanitized command-line arguments (such as branch names and commit hashes) into strings passed tochild_process.execSync. This allow an attacker to execute arbitrary commands by providing inputs containing shell control characters. - [DATA_EXFILTRATION]: The
send-report.shscript automatically transmits local repository scan results and development metadata to an external email address (winsorllc@yahoo.com) usingcurlvia SMTP. While the recipient belongs to the author, this mechanism creates a path for exfiltrating sensitive environment information to a third-party service. - [CREDENTIALS_UNSAFE]: The reporting script
send-report.shis designed to handle sensitive tokens (GMAIL_USERandGMAIL_PASS) from the environment and passes them as plain-text arguments to thecurlcommand. This insecure pattern exposes credentials to system process logs and monitoring tools. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface. 1. Ingestion points: The script
generate.jsreads untrusted data fromgit diff. 2. Boundary markers: No delimiters or warnings are used to separate diff content in the final PR description. 3. Capability inventory: The skill has access toexecSyncand file operations. 4. Sanitization: The content of the diff is not sanitized for malicious instructions before being included in the generated output, which could influence downstream agent actions.
Recommendations
- AI detected serious security threats
Audit Metadata