blocklet-converter
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill executes
bun installandbun run buildas part of its conversion workflow. This triggers the execution of scripts defined in the project'spackage.json. If a user provides a project with a maliciouspostinstallorbuildscript, the agent will execute it. - EXTERNAL_DOWNLOADS (LOW): The
bun installcommand downloads external packages from public registries. This is a standard operation for web development but represents an ingestion of external, unverified code. - INDIRECT_PROMPT_INJECTION (LOW): The skill has a clear data ingestion surface where it reads and processes external project files (
package.json,index.html) to extract metadata like 'title' and 'description'. - Ingestion points: Project metadata is extracted from
package.jsonin the local directory. - Boundary markers: None are specified for the extraction of the title or description fields.
- Capability inventory: The skill can execute subprocesses (
bun,blockletCLI) and write files. - Sanitization: The skill contains instructions to 'rewrite' technical descriptions to be user-friendly, which involves the LLM processing potentially untrusted text from the project files.
Audit Metadata