create-project
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
🔴 VERDICT: HIGH
This skill presents a HIGH risk due to potential command injection. The skill constructs shell commands using user-provided input (e.g., project name, author name) without explicit sanitization. If a malicious user provides input containing shell metacharacters (e.g., ;, &&, |), arbitrary commands could be executed on the system where the agent is running. For example, if <project-name> is provided as my-project; rm -rf /, the rm -rf / command could be executed.
Total Findings: 2
🔴 HIGH Findings: • Command Injection via Unsanitized User Input
- Line 25 (SKILL.md): The skill instructs to run
algokit init -n <project-name> -t typescript --answer author_name "<name>" --defaults. The placeholders<project-name>and<name>are directly substituted into a shell command. Without proper sanitization of user input, this creates a command injection vulnerability where a malicious user could execute arbitrary commands by providing specially crafted input.
🔵 LOW Findings: • Unverifiable Dependencies (Trusted Source)
- Line 25 (SKILL.md): The skill relies on the external
algokitcommand-line tool to initialize projects and potentially bootstrap dependencies. Whilealgokititself is a well-known tool from Algorand (a trusted organization), the skill implicitly trustsalgokitto fetch templates and manage project dependencies from external sources (e.g.,dev.algorand.co). This is noted as a low risk because the sources are trusted, but it still involves external code execution.
================================================================================
- AI detected serious security threats