omarchy-theming

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • Unverifiable Dependencies & Remote Code Execution (HIGH): The command omarchy-theme-install <git-url> enables the agent to download and install content from arbitrary external sources. Since themes can include Lua scripts (neovim.lua) and shell configuration files, this provides a direct path for remote code execution.
  • Privilege Escalation (HIGH): The troubleshooting section explicitly suggests running sudo pacman -S yq. Encouraging an AI agent to use sudo for package management is a high-risk pattern that can be exploited to gain administrative control over the system.
  • Indirect Prompt Injection (HIGH):
  • Ingestion points: External content is pulled via omarchy-theme-install from user-provided Git URLs.
  • Boundary markers: None. There are no delimiters or instructions to treat the downloaded theme data as untrusted.
  • Capability inventory: The skill uses omarchy-theme-set to apply these downloaded configurations to system-level desktop components (Alacritty, Hyprland, Waybar).
  • Sanitization: There is no evidence of validation or sanitization of the downloaded theme files before they are applied to the system.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:32 PM