lint-and-validate
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
scripts/lint_runner.pyscript executes commands viasubprocess.runthat are derived from the project's configuration. Specifically, it runsnpm run lint, which executes whatever command is defined in thescriptssection ofpackage.json. Evidence: Ingestion point:package.jsonparsing indetect_project_type. Capability:subprocess.runinrun_linter. Sanitization: None. - [PROMPT_INJECTION] (HIGH): Category 8: Indirect Prompt Injection. The skill processes untrusted external project files and provides a direct execution path for commands found within those files. There are no boundary markers or instructions to ignore embedded commands in the processed data.
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill uses
npxforeslintandtsc. These tools can download and execute packages from the public npm registry at runtime, which poses a risk of executing malicious or compromised packages.
Recommendations
- AI detected serious security threats
Audit Metadata