gitlab-copilot
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Potential shell command injection through the extraction of
mr_idandrepo_refvariables from user-supplied GitLab URLs. The skill's logic for parsing these values does not explicitly include validation or sanitization, and the extracted strings are passed as arguments toglabandgitcommands via thebashtool. - [PROMPT_INJECTION]: Vulnerability to indirect prompt injection. The skill ingests untrusted data from GitLab Merge Requests (titles, diffs, and existing comments) and includes this content directly in the prompts for specialized agents (Code Reviewer, Security, and QA).
- Ingestion points: Merge Request metadata, diffs, and discussion threads fetched via
glab mr view,glab mr diff, andglab mr note listinSKILL.md. - Boundary markers: The instructions use Markdown headers and triple-backticks to enclose the ingested data but lack explicit instructions to the processing agents to disregard instructions or commands contained within the MR content.
- Capability inventory: The agent has access to the
bashtool (shell execution),view(file system access), and theskilltool (invocation of other skills such asneo-team-copilot). - Sanitization: No sanitization or filtering of the ingested MR content is performed before it is interpolated into agent prompts.
Audit Metadata