skills/binjuhor/shadcn-lar/ui-styling/Gen Agent Trust Hub

ui-styling

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (LOW): The script 'scripts/shadcn_add.py' uses subprocess.run to execute terminal commands (npx shadcn). While arguments are passed as a list to mitigate direct shell injection, it still performs dynamic command construction.
  • EXTERNAL_DOWNLOADS (LOW): The skill's primary function involves downloading and installing React components from the npm registry and GitHub repositories. Per the trust scope rule, this is downgraded to LOW as it is the primary purpose of the skill.
  • INDIRECT_PROMPT_INJECTION (LOW): The component installation script provides an attack surface where malicious component names could be passed from an agent. Evidence: 1. Ingestion: CLI arguments in shadcn_add.py. 2. Boundaries: Absent. 3. Capability: Subprocess execution of npx commands. 4. Sanitization: Absent.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:12 PM