honest-review
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Potential command injection in
SKILL.mdhooks. ThePreToolUseandPostToolUsehooks for theEdittool interpolate the$TOOL_INPUT_file_pathvariable directly into abash -ccommand string. If the underlying platform does not sanitize this variable, a malicious file path could be used to execute arbitrary shell commands. - [PROMPT_INJECTION]: High vulnerability surface for indirect prompt injection.
- Ingestion points: Untrusted data enters via
git diff, file reads, and PR descriptions retrieved viagh pr view(SKILL.md). - Boundary markers: The subagent prompt templates in
references/team-templates.mdlack explicit delimiters or instructions to ignore embedded commands in the reviewed code. - Capability inventory: The skill possesses powerful capabilities including file editing (auto-fix protocol), shell command execution (hooks), and extensive network access via research tools.
- Sanitization: No sanitization or escaping of external content is specified before interpolation into subagent prompts.
- [COMMAND_EXECUTION]: Utility scripts such as
project-scanner.pyandsarif-uploader.pyperform various system operations usingsubprocess.run. While these scripts avoidshell=Trueand use list-based arguments, they represent a broad surface for system-level interaction that could be exploited if the agent's high-level reasoning is compromised.
Audit Metadata