gh-address-comments
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection: The skill is designed to read and act upon GitHub pull request comments and review feedback. This creates a surface for indirect prompt injection, where an external actor could place instructions within a GitHub comment attempting to influence the agent's actions (e.g., trying to redirect file modifications or bypass logic).
- Ingestion points: The
scripts/fetch_comments.pyscript retrieves data from GitHub's GraphQL API, includingcomments,reviews, andreviewThreads. - Boundary markers: The instructions in
SKILL.mddo not define specific markers or delimiters to separate the ingested comment text from the agent's core instructions. - Capability inventory: The skill possesses the capability to modify local files to "implement the selected fixes locally," making the impact of a successful injection potentially relevant to the local codebase.
- Sanitization: No explicit sanitization or filtering of the fetched comment content is performed before the agent processes it.
- Command Execution: The skill wraps the GitHub CLI (
gh) to perform its operations, using the Pythonsubprocessmodule to execute commands. - Context: In
scripts/fetch_comments.py, the_runfunction executes commands passed as a list. This is a standard and relatively secure way to interact with system tools, provided the input parameters (like repository names or PR numbers) are handled correctly.
Audit Metadata