assembling-components
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The documentation for Rust-based templates (found in
assets/templates/rust/README.mdandexamples/rust-axum-dashboard/README.md) suggests installing the Rust toolchain via a piped shell command:curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh. This is a high-risk pattern that executes unverified remote code directly in the host shell. - [EXTERNAL_DOWNLOADS] (MEDIUM): Project templates for Next.js, React, Python, and Rust rely on downloading numerous external packages from public registries (npm, PyPI, Cargo) without specific version pinning or integrity hashes (e.g.,
npm install,pip install -r requirements.txt). This introduces supply chain risks if used in an automated environment. - [COMMAND_EXECUTION] (LOW): The skill requires running various local scripts and standard development tools (e.g.,
generate_exports.py,alembic upgrade,prisma migrate) which interact with the local filesystem and system processes. While expected for the skill's purpose, these represent an interactive attack surface. - [INDIRECT_PROMPT_INJECTION] (LOW): The
generate_exports.pyscript ingests local.tsxfile content to generate barrel export files (index.ts). It uses regex to extract identifiers but lacks sanitization before writing them back to the filesystem. Evidence: Ingestion points in.tsxfiles viaPath.rglob; Capability includes filesystem write access; Sanitization of extracted export names is absent.
Recommendations
- AI detected serious security threats
Audit Metadata