get-pr-comments
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It retrieves and summarizes untrusted data from GitHub Pull Request comments and reviews.
- Ingestion points:
scripts/fetch_pr_comments.pyfetches comment, review, and inline comment bodies via the GitHub API (gh api). - Boundary markers: None. The skill does not use delimiters or specific instructions to the agent to disregard instructions contained within the fetched content.
- Capability inventory: The skill has access to
Bash(forgh,python3,grep),Read, andAskUserQuestiontools. - Sanitization: No sanitization or filtering of the fetched content is performed before it is presented to the agent. The instructions explicitly tell the agent to "relay the script output directly".
- [COMMAND_EXECUTION]: Instructions in
SKILL.md(Step 3) contain shell commands with placeholders like<PR_NUMBER>. - Example:
gh api repos/{owner}/{repo}/issues/<PR_NUMBER>/comments --paginate --slurp. - If the agent substitutes these placeholders with unsanitized user-supplied arguments (e.g.,
1; rm -rf /), it could lead to arbitrary command execution in the shell. - [COMMAND_EXECUTION]: The script
scripts/fetch_pr_comments.pyexecutes shell commands viasubprocess.runto interact with the GitHub CLI tool. - While the script uses list-based arguments which mitigate common shell injection vulnerabilities, it remains a point of interaction with the underlying system environment.
Audit Metadata