shadcn-tailwind
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill utilizes
npx shadcn@latestto download and execute initialization and component addition tools. This execution from the npm registry is not within the defined trusted sources. - REMOTE_CODE_EXECUTION (MEDIUM): The use of
npxfacilitates remote code execution at runtime, which poses a risk if the upstream package is compromised. - COMMAND_EXECUTION (MEDIUM): The skill relies on local scripts
scripts/shadcn_add.pyandscripts/tailwind_config_gen.pyfor environment setup and configuration, which can perform arbitrary file system operations. - PROMPT_INJECTION (LOW): As a code-generation and automation skill, there is a risk of indirect injection. Ingestion point: User prompt triggers; Boundary markers: None; Capability inventory: npx execution, python subprocess, file writes via scripts; Sanitization: None specified. This creates a surface where malicious instructions in a prompt could influence CLI arguments or generated code.
Audit Metadata