uv-expert
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill provides instructions for piped remote execution using
curl | shandirm | iexfor installation fromhttps://astral.sh/. Becauseastral-shis not in the predefined 'Trusted GitHub Organizations' list, this is classified as RCE from an untrusted source. Evidence:curl -LsSf https://astral.sh/uv/install.sh | shandpowershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex". - [COMMAND_EXECUTION] (HIGH): Explicitly instructs the user/agent to use
powershell -ExecutionPolicy ByPass, which is a security bypass technique to run unverified scripts on Windows systems. - [INDIRECT_PROMPT_INJECTION] (HIGH): The skill's primary utility involves executing user-defined Python scripts via
uv run. It lacks sanitization or boundary markers for this external content. In an adversarial context, a script processed by the agent could contain instructions to exploit the agent's capabilities. Capability inventory:uv run,uv tool install,uv add. Ingestion points:uv run script.pyanduv add <package>. - [EXTERNAL_DOWNLOADS] (MEDIUM): Encourages downloading and installing various Python packages (e.g.,
requests,fastapi) from external registries without requiring version pinning or cryptographic hash verification in the provided examples.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://astral.sh/uv/install.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata