zig
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Remote Code Execution] (CRITICAL): File
references/zvm.mdrecommends installing ZVM viacurl ... | bashfromraw.githubusercontent.com/tristanisham/zvm, which executes unverified remote scripts. - [Persistence Mechanisms] (HIGH): File
references/zvm.mdinstructs the agent to modify~/.bashrcand~/.zshrcto add ZVM to the system PATH. - [External Downloads] (HIGH): The skill downloads binaries from non-whitelisted repositories
tristanisham/zvmandzigtools/zlsvia curl. - [Indirect Prompt Injection] (HIGH): The skill's ingestion of untrusted project files (
build.zig,.zig) combined with its ability to execute build and test commands via MCP tools creates a significant vulnerability surface. Mandatory Evidence: (1) Ingestion points:build.zig,src/*.zig(2) Boundary markers: Absent (3) Capability inventory:zig_build,zig_testMCP tools (4) Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata