ah-verify-requirements-coverage
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted text from external sources to define its logic and report results. An attacker could craft a GitHub issue or PR description that contains instructions to override the agent's analysis or force a false coverage report.
- Ingestion points: Pull request body content (via
gh pr view), GitHub issue descriptions (viagh issue view), and code diffs (viagh pr difforgit diff). - Boundary markers: Absent. The skill does not instruct the agent to use delimiters or ignore instructions embedded within the fetched data.
- Capability inventory: Network access to the GitHub API and local shell command execution via the
gh,git, andjqutilities. - Sanitization: The skill uses regex and
jqto isolate numeric identifiers, but the descriptive text content used for requirement extraction and coverage analysis is not sanitized. - [COMMAND_EXECUTION]: The skill executes shell commands using variables like
$PR_NUMBER,$ISSUE_NUMBER, and$REPO_NAMEderived from user input or remote metadata. Although the provided procedures include patterns for numeric extraction, any failure to strictly validate these variables before shell interpolation could lead to local command injection.
Audit Metadata