code-reviewer
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes Node.js scripts (
detect-clis.mjs,invoke-cli.mjs) to discover and execute local AI CLI binaries from the system's$PATH. While these scripts use safe execution methods likespawnSyncandexecFileSync, they rely on the integrity of the user's environment. Additionally, the suggested shell instructions inreferences/cross-model-handoff.mdfor cross-model review use a heredoc (<< 'EOF') to prepare prompts; if the code being reviewed contains the delimiter on its own line followed by malicious commands, it could lead to command injection.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection where instructions embedded in the code being reviewed could influence the audit results. (1) Ingestion points: The skill ingests untrusted code and diffs via$ARGUMENTSas defined inSKILL.md. (2) Boundary markers: The instructions recommend using a--- CODE TO REVIEW ---delimiter inreferences/cross-model-handoff.md. (3) Capability inventory: The skill can read local files, run git/gh commands, and execute local binaries viainvoke-cli.mjs. (4) Sanitization: No sanitization is performed on the ingested code snippets before processing.
Audit Metadata