auth0-express
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The file
references/setup.mdcontains a command that pipes a remote script from GitHub directly into the shell. This pattern is highly susceptible to compromise. Evidence:curl -sSfL https://raw.githubusercontent.com/auth0/auth0-cli/main/install.sh | sh. - EXTERNAL_DOWNLOADS (MEDIUM): The setup script downloads the Auth0 CLI from the
auth0GitHub organization, which is not included in the predefined list of trusted organizations. - COMMAND_EXECUTION (LOW): The skill requires the execution of multiple system commands for environment setup and application execution, such as
npm install,node app.js, andopenssl. These are standard for the skill's purpose. - PROMPT_INJECTION (LOW): The skill has an indirect prompt injection surface where user data from an external provider is rendered in HTML templates. Ingestion point:
req.oidc.userinreferences/api.md. Boundary markers: Absent. Capability inventory: Route protection and session management. Sanitization: Uses EJS escaping (<%= %>).
Recommendations
- AI detected serious security threats
Audit Metadata