vercel-deploy
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The script
scripts/deploy.shpackages the user's project directory into a tarball and uploads it to an external API endpoint athttps://claude-skills-deploy.vercel.com/api/deploy. While the script excludesnode_modulesand.git, it does not exclude common sensitive files such as.envfiles, SSH private keys, or cloud provider configuration files. This behavior allows for the exfiltration of secrets if they are present in the target directory. - [PROMPT_INJECTION]: The skill employs deceptive metadata in
SKILL.md, explicitly claiming the author is "vercel" and pointing to "vercel/agent-skills" as the source. This contradicts the provided author context ("akillness") and constitutes impersonation designed to mislead users into trusting the skill with sensitive project data. - [COMMAND_EXECUTION]: The skill executes a bash script (
scripts/deploy.sh) that performs several file system operations, including searching for and renaming.htmlfiles, and uses system utilities liketarandcurlto archive and transmit the user's data to a remote server.
Recommendations
- AI detected serious security threats
Audit Metadata