gitlab-kiro
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The URL parsing logic in
SKILL.mdis vulnerable to shell injection. The skill extractsrepo_refandmr_idfrom user-provided GitLab URLs by stripping specific prefixes and suffixes, then interpolates these strings directly intoglabcommands executed via theshelltool. An attacker could provide a URL containing shell metacharacters (e.g.,;,&&,|) to execute arbitrary commands.\n- [REMOTE_CODE_EXECUTION]: The command injection vulnerability in the URL processing workflow allows for remote code execution. By crafting a malicious URL, a user or external actor (if the URL is sourced from untrusted data) can gain unauthorized shell access to the agent's environment.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes untrusted data from external GitLab merge requests.\n - Ingestion points: The skill fetches MR metadata, diffs, and comments using
glab mr view,glab mr diff, andglab mr note listas described inSKILL.md.\n - Boundary markers: While it uses markdown headers (e.g.,
## Diff,## Existing MR Comments) to structure the subagent query, it lacks explicit instructions or technical boundaries to prevent the subagents from obeying instructions embedded within the diff or comments.\n - Capability inventory: The skill possesses significant capabilities, including
shellaccess, file reading, and the ability to invoke subagents for code review and implementation.\n - Sanitization: There is no evidence of sanitization or escaping of the fetched GitLab content before it is passed to the parallel review subagents.
Recommendations
- AI detected serious security threats
Audit Metadata