The skill is vulnerable to command injection and relies on external
Claims to do
Check: Review Before You Ship: Prefix your first line with 🥷 inline, not as its own paragraph.
Actually does
This skill uses `git` and `gh` CLI to review code diffs, triage GitHub issues and PRs, and manage releases. It reads repository context (e.g., READMEs, manifests, CI configs), performs checks for hard stops and scope drift, and can apply safe auto-fixes. It interacts with GitHub to list/view/close issues and PRs, push commits, create releases, and add reactions, and can execute project-specific verification commands.
The skill constructs shell commands using potentially user-controlled input (e.g., issue keywords, search terms) without explicit sanitization, creating a command injection vulnerability. An attacker could craft malicious input to execute arbitrary commands.
`git log --oneline <latest-tag>..HEAD | grep -i "<keyword>"` `grep -r "name" .`
The skill has extensive capabilities to execute various external commands (`gh`, `git`, `bash scripts/run-tests.sh`). This broad access, while functional, presents a significant attack surface if the agent's reasoning or input is compromised, enabling a wide range of malicious actions.
`gh issue list`, `gh pr list`, `git log`, `gh api`, `bash scripts/run-tests.sh`, `grep -r`, `vercel env ls`, `git remote -v`
The skill performs wide-ranging reconnaissance, including listing issues/PRs, reading various project files, and explicitly detecting PII during document review. If the agent's output or communication channels are compromised, this gathered sensitive information could be exfiltrated.
`gh issue list`, `gh pr list`, `git log`, `grep -r`, `Privacy scan: Detect PII (names, companies, employment dates, salary hints, location details).`
The agent's critical decision-making, project context extraction, and sub-agent configurations rely on external files (`references/project-context.md`, `references/persona-catalog.md`). If these files are compromised, an attacker could poison the agent's knowledge base or inject malicious sub-agent prompts.
Load `references/project-context.md` Load `references/persona-catalog.md` to determine which specialists activate. Launch all activated specialists in parallel...
The skill is designed to apply `safe_auto` fixes immediately without user confirmation. While intended for 'unambiguous, risk-free' changes, a flaw in this classification or a manipulated definition could lead to unintended or harmful modifications without human oversight.
| `safe_auto` | Unambiguous, risk-free: typos, missing imports, style inconsistencies | Apply immediately |
[](https://mondoo.com/ai-agent-security/skills/github/tw93/waza/check)<a href="https://mondoo.com/ai-agent-security/skills/github/tw93/waza/check"><img src="https://mondoo.com/ai-agent-security/api/badge/github/tw93/waza/check.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/tw93/waza/check.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.