shadcn-ui
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for the agent to execute shell commands, such as
npx shadcn@latest add [component-name], using theBashtool. This creates a potential indirect command injection vulnerability where a malicious user could provide a component name containing shell metacharacters to execute unauthorized commands.\n - Ingestion points: The
[component-name]parameter in component installation commands.\n - Boundary markers: No delimiters or instructions are provided to the agent to treat the input as literal data only.\n
- Capability inventory: The skill is configured with access to the
Bashtool and file systemWriteoperations.\n - Sanitization: No mechanisms for sanitizing or validating user input are specified before execution.\n- [REMOTE_CODE_EXECUTION]: The instructions encourage the use of
npx shadcn@latest, which involves downloading and executing the latest CLI tool from the npm registry. While shadcn is a well-known project, this is a form of runtime remote code execution.\n- [EXTERNAL_DOWNLOADS]: The skill's installation instructions include a command to fetch the skill's source markdown from a GitHub repository usingcurl.
Audit Metadata