python-env
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides installation instructions for the uv CLI using a script download and execution pattern.
- Evidence:
SKILL.mdcontains the commandcurl -LsSf https://astral.sh/uv/install.sh | sh. This is a well-known installation method for the Astral uv tool. - [EXTERNAL_DOWNLOADS]: The skill facilitates downloading and installing Python packages from external registries.
- Evidence: Multiple files (e.g.,
SKILL.md,references/dependency-management.md) demonstrate the use ofuv pip installto fetch packages from PyPI and external Git repositories. - [COMMAND_EXECUTION]: The skill relies on the Bash tool to execute environment management and package installation commands.
- Evidence: The
allowed-toolsfield inSKILL.mdspecifiesBash, which is used throughout the documentation to demonstrateuvcommands. - [INDIRECT_PROMPT_INJECTION]: The skill defines an attack surface where the agent processes external files that could contain malicious instructions.
- Ingestion points: The agent reads
pyproject.toml,requirements.txt, andrequirements.infiles as part of its dependency management tasks. - Boundary markers: No explicit boundary markers or instruction-ignoring warnings are present in the documentation for handling these files.
- Capability inventory: The skill utilizes
Bashto runuv pip install,uv run, anduv sync, providing a pathway for code execution based on processed file content. - Sanitization: There is no evidence of sanitization or validation of the contents of requirement or configuration files before they are passed to the
uvtool.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata