perses-code-review
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It is designed to ingest and analyze untrusted content (code files, pull request diffs, and configuration schemas) from external sources.
- Ingestion points: Reads
.go,.tsx,.cue, and.json/.yamlfiles from project repositories during the Phase 1: CLASSIFY and Phase 2: REVIEW steps. - Boundary markers: The instructions lack explicit boundary markers or directives to the agent to ignore instructions embedded within the code being reviewed.
- Capability inventory: The skill is authorized to use
Bash,Write,Edit, andAgenttools across all scripts. This combination of reading untrusted data and having high-privilege tool access creates an exploitable surface. - Sanitization: There is no mention of sanitizing, escaping, or validating the external content before it is processed by the agent or passed to tools.
- [COMMAND_EXECUTION]: The skill instructs the agent to execute shell commands via the
Bashtool. - Evidence: The instructions explicitly require running
percli linton dashboard definitions and usingGrep/Globto scan the filesystem. Executing commands on files provided by external contributors carries an inherent risk of command injection if the input is not strictly validated by the underlying CLI tool.
Audit Metadata