nextjs-tinacms

Fail

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The documentation in SKILL.md and task 0.24 of references/day0-2-checklist.md explicitly instructs the user to run 'npx fix-react2shell-next'. This package is not a recognized security utility and its name suggests shell-related exploitation capabilities.
  • [COMMAND_EXECUTION]: The skill encourages the execution of unverified npx commands that download and run arbitrary code from the npm registry.
  • [DATA_EXFILTRATION]: The skill guides the user to set up sensitive environment variables including 'GITHUB_PERSONAL_ACCESS_TOKEN' and 'KV_REST_API_TOKEN'. These credentials are at high risk of being exfiltrated by the suspicious 'fix-react2shell-next' script.
  • [EXTERNAL_DOWNLOADS]: The skill recommends downloading and running code from a public registry ('fix-react2shell-next') using a deceptive justification involving non-existent future security patches.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 10, 2026, 10:24 AM