pgpm-env
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently recommends the use of
eval "$(pgpm env)"to load variables into the current shell session. This pattern executes the output of thepgpmCLI directly, which can lead to arbitrary command execution if the tool's output is compromised or maliciously influenced by configuration files. - [COMMAND_EXECUTION]: Documentation suggests using
bash -cto execute concatenated command strings, which is a potential shell injection vector. - [COMMAND_EXECUTION]: The skill instructs users to modify persistent shell configuration files such as
~/.bashrcand~/.zshrcto add aliases that automatically execute theevallogic in future sessions. - [CREDENTIALS_UNSAFE]: The documentation contains hardcoded default credentials (e.g.,
PGPASSWORD="password",PGUSER="supabase_admin"). Although intended for local development, hardcoding credentials in instruction files is a suboptimal security practice.
Audit Metadata