web-artifacts-builder
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The initialization script (
scripts/init-artifact.sh) attempts to install thepnpmpackage manager globally usingnpm install -g pnpmif it is not detected in the path. This constitutes a modification of the global environment and a privilege escalation vector in restricted agent execution environments. - [EXTERNAL_DOWNLOADS]: The skill dynamically downloads and installs a large quantity of external dependencies from the NPM registry, including the Vite build tool, Tailwind CSS, and over 40 UI component libraries from the Radix UI ecosystem.
- [COMMAND_EXECUTION]: The skill uses
scripts/init-artifact.shandscripts/bundle-artifact.shto perform extensive file system and configuration tasks, such as generatingtailwind.config.js, creating.parcelrc, and usingnode -eto programmatically modifytsconfig.jsonfiles. - [REMOTE_CODE_EXECUTION]: The bundling process uses
pnpm exec parcelandpnpm exec html-inlineto execute binaries that were downloaded during the session, effectively running external code as local processes. - [PROMPT_INJECTION]: The
SKILL.mdfile contains instructions regarding design guidelines to avoid 'AI slop,' which is a benign use of natural language to influence agent output rather than a malicious safety bypass.
Audit Metadata