code-review-playbook
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection. It fetches PR metadata and code diffs from GitHub and incorporates them directly into the agent's context. A malicious actor could embed instructions within a PR to manipulate the agent's review logic or tool usage.
- Ingestion points: PR title, body, comments, and diff content retrieved via
gh pr viewandgh pr diffcommands inscripts/review-pr.md. - Boundary markers: Absent. The data is placed under generic markdown headers without delimiters or specific "ignore embedded instructions" warnings.
- Capability inventory: The agent has access to
Bash,Read, andGreptools, which provides a significant capability set if an injection is successful. - Sanitization: Absent. No filtering or escaping is applied to the content received from the GitHub API before it is processed.
- [COMMAND_EXECUTION] (LOW): The skill relies on shell command execution via the
ghCLI and various linters (e.g.,ruff,eslint,biome). While these are legitimate functions of the skill, they represent the execution of potentially influenced logic if prompt injection occurs. - [EXTERNAL_DOWNLOADS] (LOW): The
scripts/run-lint-check.shscript andrules/linting-biome-setup.mdrecommend or usenpxto execute tools likeeslintandbiome. This involves fetching and executing code from the npm registry at runtime, which introduces a supply chain dependency risk.
Audit Metadata