auth0-vue
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The Bash script in
references/setup.mddownloads and executes the Auth0 CLI installation script usingcurl | sh. This piped execution pattern is high-risk as it allows unverified remote code to run with the user's shell privileges.- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill documentation and setup scripts facilitate the installation of external dependencies and binaries from multiple sources including npm, Homebrew, and Scoop without integrity verification.- [COMMAND_EXECUTION] (MEDIUM): Setup scripts inreferences/setup.md(both Bash and PowerShell) automate system-level operations including CLI tool invocation, application creation via the Auth0 API, and local filesystem writes for environment configuration.- [DATA_EXPOSURE] (LOW): The setup scripts automate the creation of a.envfile containing Auth0 credentials. While these are public client credentials, the automated handling of environment files is a potential surface for sensitive data mismanagement.- [INDIRECT_PROMPT_INJECTION] (LOW): The setup scripts inreferences/setup.mdingest untrusted user input via shell prompts (e.g., APP_ID) and interpolate them directly into shell commands and file-write operations without sanitization.
Recommendations
- AI detected serious security threats
Audit Metadata