dependency-audit

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [Indirect Prompt Injection] (HIGH): Malicious dependencies in project files can trigger unauthorized actions during updates. Evidence: 1. Ingestion points: Dependency lists from npm and pip in SKILL.md and license-checker.py. 2. Boundary markers: Absent; package names are directly interpolated into commands. 3. Capability inventory: Permission to run pip install and npm install. 4. Sanitization: None; package names are not validated or escaped.
  • [Command Execution] (MEDIUM): The use of xargs with pip install without input validation allows for potential flag injection or command execution if a package name is maliciously formatted.
  • [External Downloads] (LOW): The skill directs the user to install third-party tools such as pip-audit and snyk. While from trusted registries, these constitute external code dependencies.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 02:05 AM