pr-reviewer

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches a GitHub PR review tool, but the script appears to insert PR-controlled file data into Python code, which could let a crafted PR run code on your machine.

Review and fix the unsafe Python interpolation before using this on untrusted PRs. If you do use it, run it with least-privileged GitHub credentials, verify the correct script path, inspect reports before posting comments, and keep generated report files private.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Reviewing a malicious or unusually crafted PR could execute commands on the reviewer's machine under the user's account.

Why it was flagged

The script constructs a Python program using shell interpolation instead of passing data safely via stdin, argv, or JSON. Because the skill fetches changed file paths from GitHub PRs for its advertised test-coverage analysis, a crafted filename containing Python string delimiters could break out of this literal and execute local code if this function is reached.

Skill content
files = '''$1'''.strip().split('\n')
Recommendation

Do not construct Python source with untrusted values. Pass PR file lists through stdin, argv, or a temporary JSON file, and encode values with a safe serializer before use.

What this means

If used carelessly, the skill could publish incorrect, noisy, or sensitive review comments to a pull request.

Why it was flagged

The skill can post generated review output back to GitHub when the user runs the post command. That mutation authority is disclosed and purpose-aligned, but it affects a shared repository conversation.

Skill content
Repository access (read at minimum, write for posting comments)
Recommendation

Run report generation first, review the output, and only use posting with explicit intent and an appropriately scoped GitHub account.

What this means

The skill can read PR data and, if the account has write access and post is used, write comments as the authenticated GitHub user.

Why it was flagged

The skill uses the local GitHub CLI session rather than a declared environment variable credential. This is expected for a GitHub PR reviewer, but it means the skill operates with whatever repository permissions gh currently has.

Skill content
Requires `gh` CLI authenticated with repo access.
Recommendation

Use the least-privileged GitHub authentication available, preferably limited to the intended repository and avoiding broad personal access tokens.

What this means

A user may be confused or may execute a different local script than the one reviewed here.

Why it was flagged

The SKILL.md examples reference scripts/github/pr-reviewer.sh, while the supplied manifest/code file is scripts/pr-review.sh. This appears to be a packaging or documentation mismatch rather than hidden behavior, but it can cause users or agents to run the wrong file if another script exists at the documented path.

Skill content
scripts/github/pr-reviewer.sh check
Recommendation

Fix the documented command path to match the packaged script, and verify the exact script path before running it.

What this means

Generated report files may retain sensitive code or secret-like snippets on disk.

Why it was flagged

The skill persistently writes review reports that may contain private PR metadata, lint output, and snippets of changed code, including secret-looking lines flagged by its checks. This is disclosed and purpose-aligned, but users should treat the reports as repository data.

Skill content
Reports are saved as markdown files in the output directory. Each report includes ... Automated diff findings with file, line, category, and context
Recommendation

Store reports in a private directory, avoid sharing them broadly, and consider redacting secret values before posting or archiving reports.