assembling-components

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (HIGH): The documentation for Rust-based templates (found in assets/templates/rust/README.md and examples/rust-axum-dashboard/README.md) suggests installing the Rust toolchain via a piped shell command: curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh. This is a high-risk pattern that executes unverified remote code directly in the host shell.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): Project templates for Next.js, React, Python, and Rust rely on downloading numerous external packages from public registries (npm, PyPI, Cargo) without specific version pinning or integrity hashes (e.g., npm install, pip install -r requirements.txt). This introduces supply chain risks if used in an automated environment.
  • [COMMAND_EXECUTION] (LOW): The skill requires running various local scripts and standard development tools (e.g., generate_exports.py, alembic upgrade, prisma migrate) which interact with the local filesystem and system processes. While expected for the skill's purpose, these represent an interactive attack surface.
  • [INDIRECT_PROMPT_INJECTION] (LOW): The generate_exports.py script ingests local .tsx file content to generate barrel export files (index.ts). It uses regex to extract identifiers but lacks sanitization before writing them back to the filesystem. Evidence: Ingestion points in .tsx files via Path.rglob; Capability includes filesystem write access; Sanitization of extracted export names is absent.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:13 PM