adversarial-review
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill identifies and manages the surface for indirect prompt injection inherent in its role as a code reviewer.
- Ingestion points: Untrusted code changes are ingested from
git diffandgh pr diffas defined inSKILL.md. - Boundary markers: Review prompts in
prompts/reviewer-a.md,prompts/reviewer-b.md,prompts/cross-review.md, andprompts/synthesis.mdutilizeBEGIN_UNTRUSTED_CODEandEND_UNTRUSTED_CODEdelimiters. - Capability inventory: The skill utilizes subprocess calls to
git,gh, andclaudeCLI tools to perform its functions. - Sanitization: Sub-agents are explicitly instructed to ignore embedded directives and treat the input strictly as code, supported by the use of stdin redirection for data passing.
- [DATA_EXPOSURE]: Sensitive code artifacts are protected by creating a restricted temporary directory using
mktemp -dfollowed bychmod 700inSKILL.md, ensuring that temporary review files are not globally readable. - [COMMAND_EXECUTION]: The skill safely executes CLI tools by avoiding the interpolation of untrusted diff content directly into shell commands, opting instead for file-based input and redirection to the sub-agent CLI.
Audit Metadata