cli-to-js-api-wrapper
Warn
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's primary purpose is to spawn and interact with arbitrary system binaries like git, npm, and docker. It provides methods like
spawnCommandandconvertCliToJsthat execute shell commands based on programmatically generated strings. - [EXTERNAL_DOWNLOADS]: The documentation instructs users to install the
cli-to-jspackage from the NPM registry and utilizesnpxto execute remote code for generating TypeScript wrappers. - [DATA_EXFILTRATION]: The API allows for the configuration of environment variables (
env) and working directories (cwd) for command execution. This allows an agent to access potentially sensitive environment data and file system paths. - [PROMPT_INJECTION]: The tool parses untrusted output from CLI help commands to dynamically build its API schema, creating a surface for indirect prompt injection. * Ingestion points:
convertCliToJsreads binary help output;fromHelpTextreads string inputs. * Boundary markers: Absent for the ingestion of CLI output. * Capability inventory:spawnCommand,exec, and file-writing vianpxcode generation. * Sanitization: Absent for parsed CLI output; input validation for flags is provided but not for the schema source itself. - [REMOTE_CODE_EXECUTION]: The
npxcommand and the ability to execute dynamically specified binaries constitute a remote and local code execution surface.
Audit Metadata