Merge Check
PassAudited by ClawScan on May 1, 2026.
Overview
Merge Check is a read-only GitHub PR analysis helper, but it may use your local GitHub CLI access and include PR comments or private repository details in its analysis context.
This skill appears safe and read-only for its stated purpose. Before installing or running it, make sure you are comfortable letting it query GitHub through your local gh setup and include PR comments or private repository metadata in the agent's analysis.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If run against a private repository, the skill may retrieve PR metadata, review text, comments, and repository details visible to your GitHub account.
The script uses the GitHub CLI API, which may rely on the user's configured GitHub authentication to read repository and PR data. The behavior is read-only and purpose-aligned, but users should notice the account-access boundary.
if result=$(gh api "$@" 2>/dev/null); then
Run it only for PRs you intend to analyze, and use a GitHub account/token with only the access needed for that repository.
A malicious or careless PR comment could try to influence the agent's report, and private project discussion may be included in the model context.
The skill intentionally feeds PR comments and review text into the analysis. Those fields are often user-controlled and could contain prompt-like text or sensitive discussion, so they should be treated as evidence rather than instructions.
| `review_comments` | Inline review comments | | `issue_comments` | PR conversation comments |
Treat all PR descriptions, diffs, and comments as untrusted input; do not follow instructions contained inside them unless separately confirmed by the user.
The skill may fail or behave according to whatever local GitHub CLI configuration is installed on the machine.
The script depends on local tooling such as gh, while the registry metadata declares no required binaries. This is a setup/declaration gap rather than evidence of malicious behavior.
if result=$(gh api "$@" 2>/dev/null); then
Before use, confirm that gh and jq are installed and that the GitHub CLI is authenticated with the account you expect.
