web-artifacts-builder
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Remote Code Execution] (HIGH): The skill frequently executes remote code from the NPM registry via
pnpm create viteandpnpm exec parcel. These tools fetch and run logic at runtime, which could be compromised if the agent is directed to use malicious inputs or modified project templates. - [Indirect Prompt Injection] (HIGH): (Category 8) The skill exhibits a high-privilege attack surface. Ingestion points: User-provided
<project-name>inscripts/init-artifact.shand general artifact requirements. Boundary markers: None. Capability inventory: Includesnpm install -g,pnpm install,node -e, andpnpm exec parcel. Sanitization: Absent; the project name is interpolated directly intosedand directory operations. - [Unverifiable Dependencies] (MEDIUM): (Category 4) The skill extracts a local tarball (
shadcn-components.tar.gz) of unknown provenance into the project'ssrc/directory. This bypasses package manager checks and could be used to distribute malicious component code. - [Privilege Escalation] (MEDIUM): The
scripts/init-artifact.shscript installspnpmglobally (npm install -g pnpm), which changes the host system's global environment and may affect other processes. - [Dynamic Execution] (MEDIUM): The initialization script uses
node -eto dynamically modify JSON configuration files. This constitutes runtime code execution that could be exploited if inputs are crafted to escape string boundaries. - [External Downloads] (LOW): The skill installs over 50 dependencies from NPM. While the packages are standard, the volume of external code introduces a dependency supply chain risk.
Recommendations
- AI detected serious security threats
Audit Metadata