stacked-prs
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Malicious Content] (HIGH): The
SKILL.mdfile recommends the use ofstacked.dev, a domain flagged as malicious by automated security scanners. - [Remote Code Execution] (HIGH): The script
scripts/create-stacked-pr.mdexecutessource scripts/stack-scripts.sh. This file is not included in the skill distribution, creating a critical vulnerability where arbitrary code could be executed if a malicious script is present in the environment's path. - [Indirect Prompt Injection] (HIGH): The skill is highly vulnerable to indirect injection as it ingests untrusted repository data (branch names, commit messages) and interpolates them directly into shell commands. An attacker could craft a malicious commit message containing shell metacharacters to achieve command injection when the agent runs
gh pr create. Evidence: Inscripts/create-stacked-pr.md,$(git log -1 --format=%s)is used within a command string without sanitization. - [External Downloads] (MEDIUM): Documentation in
SKILL.mdinstructs users to rungh extension install dlvhdr/gh-dash, which downloads and executes third-party code from an untrusted GitHub repository. - [Command Execution] (MEDIUM): Extensive use of the
Bashtool for git operations increases the overall attack surface, particularly when combined with the lack of input validation for repository-derived strings.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata