building-glamorous-tuis
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (LOW): The skill instructs the installation of several external binaries and libraries via
brew installandgo get. The sources (github.com/charmbracelet) are well-known in the developer community but are not on the explicit trusted organization list.\n- PROMPT_INJECTION (LOW): Category 8: Indirect Prompt Injection surface. The skill captures external data via TUI primitives and interpolates them into system commands. \n - Ingestion points:
gum input,gum choose, andgum filterinSKILL.md.\n - Boundary markers: Absent in code snippets.\n
- Capability inventory: Shell execution through
git commitandcurlcommands.\n - Sanitization: Snippets do not demonstrate escaping or validation of user-inputted variables (e.g.,
$MSG) before shell interpolation.\n- CREDENTIALS_UNSAFE (SAFE): A dummy keysk-1234567890is provided as an illustrative example for theskatetool. This is a common documentation placeholder and not a functional secret. Thepopemail tool correctly recommends using environment variables for SMTP credentials.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata