review-pr
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The review workflow in
references/review-workflow.mdandreferences/performance-review.mdencourages the agent to run project-specific commands such asnpm test,pytest,go test, andnpm run build. This involves executing code from the pull request being reviewed, which is an untrusted source. While necessary for verifying the PR's impact, this poses a risk if the PR contains malicious build/test scripts. - [INDIRECT_PROMPT_INJECTION]: The skill is designed to ingest and process data from pull request bodies, linked issues, commit messages, and the code diff itself as detailed in
references/review-workflow.md. This content is attacker-controllable and could contain instructions designed to manipulate the agent's behavior during the review process. - Ingestion points:
gh pr view,gh issue view, andgh pr diffcommands used in Phase 1 and Phase 4. - Boundary markers: The instructions do not explicitly mandate the use of XML tags or other delimiters to isolate untrusted PR content from the agent's system instructions.
- Capability inventory: The agent can execute
ghandgitcommands, run local shell commands (test/build), and post comments back to GitHub. - Sanitization: No specific sanitization or filtering of input from PR content is described in the workflow.
- [DATA_EXFILTRATION]: The skill has the capability to read local file contents and PR metadata and then post this information back to GitHub via
gh pr commentorgh pr review. While this is the intended functionality, it could be abused if an indirect injection instructs the agent to leak sensitive local files (e.g.,.env,.ssh) into a PR comment.
Audit Metadata