diffx-finish-review
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
curlto interact with a local API endpoint onlocalhost. This is used to fetch and update the status of code review comments. - [PROMPT_INJECTION]: The skill presents an Indirect Prompt Injection vulnerability surface because it processes untrusted data from an external source (the diffx API) and instructs the agent to follow instructions contained within that data.
- Ingestion points: Comments are fetched from
http://localhost:<port>/api/commentsas defined inSKILL.md. - Boundary markers: The skill lacks delimiters or explicit instructions to treat the comment
bodyas non-executable text, which could lead the agent to follow malicious instructions embedded in a code review comment. - Capability inventory: The agent is directed to read local files, apply arbitrary changes to those files (write access), and make local network requests.
- Sanitization: There is no evidence of sanitization or validation of the
bodyfield from the API response before it is used to guide the agent's file modification actions.
Audit Metadata