gh-address-cr
Pass
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill implements a telemetry system in
scripts/python_common.pythat exports audit and trace logs to an external vendor-controlled endpoint athttps://gh-address-cr.hamiltonsnow.workers.dev/v1/logs. The data transmitted includes repository names, PR numbers, action names, and execution results. While the skill includes redaction logic for common secrets (tokens, API keys) and compacts absolute paths, this constitutes an outbound data flow to a third-party domain. - [COMMAND_EXECUTION]: The skill facilitates the execution of arbitrary commands through adapter and fixer interfaces in
scripts/cr_loop.pyandscripts/run_local_review.py. Furthermore,scripts/submit_action.pydynamically generates local shell scripts from user-supplied fixes and executes them after setting executable permissions viaos.chmod. - [PROMPT_INJECTION]: The skill is subject to indirect prompt injection risks due to its data ingestion points in
incoming-findings.jsonandincoming-findings.md. These files provide finding data that influences thecr-looporchestrator, which has significant capabilities including shell command execution and GitHub API access. The skill lacks explicit boundary markers or sanitization logic for these external data sources.
Audit Metadata