auth0-nextjs
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The file
references/setup.mdprovides a bash script that executescurl -sSfL https://raw.githubusercontent.com/auth0/auth0-cli/main/install.sh | sh. This is a piped remote execution pattern. Because the organizationauth0is not on the list of Trusted External Sources, this pattern is classified as a high-severity security risk, potentially allowing arbitrary code execution from a remote source. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill directs users to download the Auth0 CLI via a shell script and install the
@auth0/nextjs-auth0package via npm. These actions introduce external dependencies into the environment. The use of a piped script instead of a verified package manager for the CLI installation increases the risk of supply chain attacks. - [COMMAND_EXECUTION] (MEDIUM): The setup script in
references/setup.mdautomates the creation of Auth0 applications using theauth0 apps createcommand. It subsequently uses shell utilities likegrepandcutto parse sensitive output, includingclient_secret, which is then written to a local.env.localfile. - [CREDENTIALS_UNSAFE] (LOW): While the skill correctly advises users to add
.env.localto.gitignore, the automated setup process handles raw secrets (AUTH0_CLIENT_SECRET,AUTH0_SECRET) in plaintext within the shell environment, creating a brief window of exposure in process lists or shell history.
Recommendations
- AI detected serious security threats
Audit Metadata