requesting-code-review
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes standard version control commands to identify and extract code changes for analysis.
SKILL.md: Executesgit rev-parseandgit logto determine the start and end commit identifiers (SHAs) for the review range.code-reviewer.md: Instructs the subagent to executegit diff --statandgit diffusing the provided SHAs to inspect the modified code.- [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection because the subagent processes untrusted external data (code changes and user-provided descriptions).
- Ingestion points: External data enters the context via the
git diffcommand output and the{WHAT_WAS_IMPLEMENTED},{PLAN_OR_REQUIREMENTS}, and{DESCRIPTION}placeholders incode-reviewer.md. - Boundary markers: The template uses markdown headers (e.g.,
## Requirements/Plan) to separate sections, but lacks explicit instructions to ignore embedded commands within the code being reviewed. - Capability inventory: The subagent has the capability to execute
gitcommands as specified in the template. - Sanitization: No explicit sanitization or validation of the commit range or placeholder content is implemented.
- Assessment: This is a common and necessary pattern for automated code review tools; the risk is considered low within the intended scope of development workflows.
Audit Metadata