auth0-quickstart
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The file
references/cli.mdinstructs users to download a shell script fromhttps://raw.githubusercontent.com/auth0/auth0-cli/main/install.shand pipe it directly to the shell (| sh). This constitutes an unverified remote code execution pattern from a source not listed in the Trusted External Sources. - [CREDENTIALS_UNSAFE] (HIGH): Instructions in
references/cli.mdrecommend the use of theauth0 apps show <app-id> --revealcommand, which explicitly outputs sensitive client secrets in plain text to the terminal and agent context. - [COMMAND_EXECUTION] (MEDIUM): The framework detection logic in
SKILL.mdperforms system commands likecat package.json | grepandls -la | grep. These commands can be influenced by malicious file content or names in the local environment. - [EXTERNAL_DOWNLOADS] (LOW): The skill encourages downloading and installing the Auth0 CLI through third-party package managers (Homebrew, Scoop, Chocolatey).
- [PROMPT_INJECTION] (LOW): Indirect Prompt Injection surface (Category 8) identified. 1. Ingestion: Reading
package.jsonand directory listings. 2. Boundary markers: Absent. 3. Capability inventory: System command execution and CLI interaction. 4. Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata