nextjs-tinacms
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation in SKILL.md and task 0.24 of references/day0-2-checklist.md explicitly instructs the user to run 'npx fix-react2shell-next'. This package is not a recognized security utility and its name suggests shell-related exploitation capabilities.
- [COMMAND_EXECUTION]: The skill encourages the execution of unverified npx commands that download and run arbitrary code from the npm registry.
- [DATA_EXFILTRATION]: The skill guides the user to set up sensitive environment variables including 'GITHUB_PERSONAL_ACCESS_TOKEN' and 'KV_REST_API_TOKEN'. These credentials are at high risk of being exfiltrated by the suspicious 'fix-react2shell-next' script.
- [EXTERNAL_DOWNLOADS]: The skill recommends downloading and running code from a public registry ('fix-react2shell-next') using a deceptive justification involving non-existent future security patches.
Recommendations
- AI detected serious security threats
Audit Metadata