ui-styling
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/shadcn_add.pyutilizessubprocess.runto invoke thenpx shadcn@latestCLI tool. It dynamically assembles the command by appending component names received as command-line arguments, which is an intended automation feature but constitutes a system interaction surface. - [EXTERNAL_DOWNLOADS]: The skill uses the
npxutility to download and execute theshadcnCLI tool directly from the npm registry. This process is documented as the standard method for managing the library and involves well-known developer tooling. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection because its utility scripts ingest untrusted data (such as component names, color tokens, and font families) from the agent context. These inputs are interpolated into shell commands (
shadcn_add.py) and generated configuration files (tailwind_config_gen.py) without dedicated sanitization or boundary markers to differentiate instructions from data.
Audit Metadata