tool-ui-integrator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill repeatedly generates and encourages the execution of commands to download configuration and code from
https://tool-ui.com/r/{name}.jsonusingnpx shadcn add. Becausetool-ui.comis not a verified trusted source, this allows for the installation of arbitrary, potentially malicious code or scripts into the user's project.\n- REMOTE_CODE_EXECUTION (HIGH): Thenpx shadcn addcommand with a remote URL is a mechanism for remote code execution. Shadcn registry files can contain instructions to install dependencies and write files to the local system, meaning the owner of the remote domain can execute code on the developer's machine when these commands are run.\n- COMMAND_EXECUTION (MEDIUM): The skill includes multiple Python scripts (tool_ui_compat.py,tool_ui_components.py,tool_ui_scaffold.py) that perform local operations such as modifyingcomponents.jsonand generating shell commands for the agent to execute. While these are utility scripts, they operate with the same privileges as the agent.\n- DATA_EXFILTRATION (MEDIUM): The scriptscripts/tool_ui_compat.pyperforms a recursive scan of the entire project root (rglob('*')) to identify import patterns in code files. While no direct network exfiltration was detected in the provided code, this broad file system access to a user's entire codebase represents a significant security surface for potential data exposure.
Recommendations
- AI detected serious security threats
Audit Metadata