autonomous-dev
Warn
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill implements an "Autonomous Mode" that parses requirements and instructions from GitHub issue bodies and comments (found in
references/autonomous-mode.md). This creates a vulnerability to indirect prompt injection, where an attacker could provide malicious instructions in an issue that the agent would then follow. - [COMMAND_EXECUTION]: The skill defines a large set of
PreToolUseandPostToolUsehooks in theSKILL.mdfrontmatter. These hooks automatically execute shell scripts located in the$CLAUDE_PROJECT_DIR/hooks/directory whenever tools likeBash,Write, orEditare invoked. This represents a significant execution of project-local code triggered by normal agent activity. - [COMMAND_EXECUTION]: In
references/autonomous-mode.md, the skill describes a mechanism to "Apply Pre-existing Changes" by executinggit applyon diffs orgit cherry-pickon branches specified within the issue body. Although it contains a warning to only trust collaborators, this functionality provides a direct path for external code to be merged into the repository through automated agent actions. - [COMMAND_EXECUTION]: The skill utilizes a script
scripts/gh-as-user.shto post comments on GitHub PRs. As stated inSKILL.mdandreferences/review-commands.md, this is specifically designed to bypass bot-detection filters (e.g., Amazon Q Developer) that would ignore comments from the agent's default identity.
Audit Metadata