ui-styling

Warn

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [PROMPT_INJECTION] (MEDIUM): The file references/canvas-design-system.md contains simulated user feedback intended to override the agent's default behavior and quality standards. Evidence: "User already said: 'It isn't perfect enough. Must be pristine...' Apply this standard before delivery." This technique can be used to bypass system-level constraints by injecting high-priority instructions into the agent's context under the guise of prior user history.
  • [COMMAND_EXECUTION] (MEDIUM): The script scripts/shadcn_add.py uses subprocess.run to execute external CLI tools. Evidence: cmd = ["npx", "shadcn@latest", "add"] + components in scripts/shadcn_add.py. This allows the agent to execute commands on the host system. While shell injection is partially mitigated by the use of a list for arguments, the execution of arbitrary package manager commands still carries inherent risk.
  • [EXTERNAL_DOWNLOADS] (LOW): The skill documentation and helper scripts encourage and facilitate downloading code from the npm registry. Evidence: Use of npx shadcn@latest and npm install in SKILL.md and scripts/shadcn_add.py. Risk: Introduces external dependencies from public registries which may be subject to supply chain attacks.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 08:48 AM