omarchy-theming
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (HIGH): The command
omarchy-theme-install <git-url>enables the agent to download and install content from arbitrary external sources. Since themes can include Lua scripts (neovim.lua) and shell configuration files, this provides a direct path for remote code execution. - Privilege Escalation (HIGH): The troubleshooting section explicitly suggests running
sudo pacman -S yq. Encouraging an AI agent to usesudofor package management is a high-risk pattern that can be exploited to gain administrative control over the system. - Indirect Prompt Injection (HIGH):
- Ingestion points: External content is pulled via
omarchy-theme-installfrom user-provided Git URLs. - Boundary markers: None. There are no delimiters or instructions to treat the downloaded theme data as untrusted.
- Capability inventory: The skill uses
omarchy-theme-setto apply these downloaded configurations to system-level desktop components (Alacritty, Hyprland, Waybar). - Sanitization: There is no evidence of validation or sanitization of the downloaded theme files before they are applied to the system.
Recommendations
- AI detected serious security threats
Audit Metadata