review-pr
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill runs validation commands such as
pytest,npm run test, anddocker-composeon the code within the pull request as specified inreferences/validation-commands.md. If a pull request includes malicious test logic or script definitions inpackage.jsonor test files, the agent will execute this code on the local system during the review process. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it retrieves untrusted pull request data (titles, bodies, and code diffs) via the
ghCLI and interpolates it directly into sub-agent prompts. 1. Ingestion points: PR metadata and file diffs fetched in Phase 1. 2. Boundary markers: Absent; external content is injected directly into prompt strings. 3. Capability inventory:Bash,Write,Edit,TaskCreate, andghCLI (allowing for code modification and PR approval). 4. Sanitization: Absent. - [COMMAND_EXECUTION]: The skill makes extensive use of the
Bashtool to run the GitHub CLI and various development tools. These commands are executed in the context of the repository being reviewed, creating a significant attack surface if the repository contents are untrusted. - [EXTERNAL_DOWNLOADS]: The use of package managers like
npmandpoetry, along withdocker-compose, can trigger the download of external dependencies or container images from remote registries. These downloads are directed by configuration files found within the pull request, potentially leading to the ingestion of malicious packages.
Audit Metadata