create-pr
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes several standard shell commands through
gitand the GitHub CLI (gh). These includegit status,git diff,git log,git push, andgh pr create. These commands are necessary for the skill's primary purpose of managing Git workflows and creating pull requests. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection as it processes untrusted data from the codebase (such as git commit logs and diffs) to generate pull request metadata. This is a common characteristic of developer tools that summarize changes.
- Ingestion points: Data is ingested from local files (PR templates) and the repository's git history (
git log,git diff). - Boundary markers: The skill uses a structured template for the pull request body and a quoted heredoc (
cat <<'EOF') in the shell command construction, which provides basic mitigation against command injection in the body content. - Capability inventory: The skill has the capability to execute shell commands with local file system access and network write access via Git/GitHub CLI.
- Sanitization: There is no explicit sanitization of git output before it is interpolated into the PR title; the skill relies on the agent's internal logic to safely handle these strings.
Audit Metadata