requesting-code-review
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The template in
code-reviewer.mdincorporates variables ({BASE_SHA},{HEAD_SHA}) directly into shell commands (git diff) that are executed by a subagent. If these variables are supplied by an untrusted source or manipulated to include shell metacharacters (e.g.,;,&&,|), it could lead to arbitrary command execution within the subagent's environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it requires the agent to read and evaluate code changes.
- Ingestion points: The subagent ingests untrusted content from the codebase through the
git diffoutput as defined incode-reviewer.md. - Boundary markers: While the template uses markdown code blocks to encapsulate the diff, it lacks clear instructions to the subagent to ignore instructions or logic embedded within the code comments or strings.
- Capability inventory: The reviewer subagent is a general-purpose agent with the ability to execute shell commands and utilize system tools as specified in
SKILL.md. - Sanitization: There is no evidence of sanitization or content filtering for the code being reviewed before it is passed to the subagent.
Audit Metadata