artifacts-builder
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
scripts/init-artifact.shscript is vulnerable to shell command injection. The$PROJECT_NAMEvariable is unsafely interpolated into asedcommand line without sanitization or proper quoting (e.g.,'$PROJECT_NAME'). This allows a malicious user or input to execute arbitrary shell commands on the host system. - [COMMAND_EXECUTION] (MEDIUM): The initialization script performs a global installation of the
pnpmpackage manager usingnpm install -g pnpmif it is not detected. Global installations can modify system-wide configurations and typically require elevated permissions. - [REMOTE_CODE_EXECUTION] (HIGH): The skill utilizes
pnpm create viteandpnpm install, which download and execute code from the npm registry at runtime. This introduces a significant reliance on the security of the external package ecosystem. - [EXTERNAL_DOWNLOADS] (LOW): The skill downloads and installs over 50 external Node.js packages during the project setup and bundling phases (including Vite, Tailwind CSS, and various Radix UI components).
- [PROMPT_INJECTION] (LOW): The
SKILL.mdfile contains instructions labeled 'VERY IMPORTANT' that attempt to override the model's creative style (e.g., avoiding 'AI slop'), which is a form of behavioral instruction override.
Recommendations
- AI detected serious security threats
Audit Metadata