candid-review
Warn
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill constructs shell commands by interpolating values from
.candid/config.jsonand~/.candid/config.jsonwithout sanitization. Specifically, themergeTargetBranchesvalues are used directly ingit diff <branch>...HEADcommands, allowing an attacker to execute arbitrary commands by supplying a malicious branch name in a repository's configuration file. - [COMMAND_EXECUTION]: The automatic commit functionality (Step 9.5) executes
git addusing a list of modified file paths. If a repository contains files with maliciously crafted names, this can lead to command injection when the agent attempts to stage those files via a shell interface. - [PROMPT_INJECTION]: The skill is designed to analyze and process untrusted external code changes (git diffs), making it highly susceptible to indirect prompt injection. Malicious instructions embedded in code comments could manipulate the agent's review logic or trick it into using its file-editing and git-commit capabilities to introduce security vulnerabilities.
- [COMMAND_EXECUTION]: The configuration schema defined in
CONFIG.mdincludesbuildCommandandtestCommandfields designed to be executed as shell commands. This design pattern encourages the execution of unvalidated, user-supplied shell strings, presenting a significant system execution risk.
Audit Metadata