bknd-local-setup
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill instructs users to run 'curl -fsSL https://bun.sh/install | bash' to install the Bun runtime. This is a piped remote execution pattern that runs unverified code from an external URL not listed in the trusted sources. This represents a critical security risk as the remote script can be modified to include malicious payloads.
- [DATA_EXFILTRATION] (MEDIUM): The skill accesses and manages '.env' files which typically contain sensitive credentials. While used for local configuration, reading from environment variables (env.DB_URL) and providing instructions on .env setup allows for potential exposure of secrets if handled by a malicious agent.
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill utilizes package managers to install unversioned third-party packages such as 'bknd', 'tsx', and 'nodemon' from public registries. This introduces supply chain risks where a compromised package could execute malicious code during installation.
- [COMMAND_EXECUTION] (MEDIUM): The skill requires the execution of several shell commands including 'rm data.db' (file deletion), 'kill -9' (process termination), and 'chmod 755' (permission modification). These commands provide the agent with significant control over the local file system and processes.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata