dependency-audit
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (HIGH): Malicious dependencies in project files can trigger unauthorized actions during updates. Evidence: 1. Ingestion points: Dependency lists from npm and pip in SKILL.md and license-checker.py. 2. Boundary markers: Absent; package names are directly interpolated into commands. 3. Capability inventory: Permission to run pip install and npm install. 4. Sanitization: None; package names are not validated or escaped.
- [Command Execution] (MEDIUM): The use of xargs with pip install without input validation allows for potential flag injection or command execution if a package name is maliciously formatted.
- [External Downloads] (LOW): The skill directs the user to install third-party tools such as pip-audit and snyk. While from trusted registries, these constitute external code dependencies.
Recommendations
- AI detected serious security threats
Audit Metadata