encore-go-getting-started
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill directs users to execute shell and PowerShell scripts directly from a remote server without verification.
- Evidence:
curl -L https://encore.dev/install.sh | bash(Linux/macOS) - Evidence:
iwr https://encore.dev/install.ps1 | iex(Windows) - Risk: Piped execution of remote content is a high-risk pattern that allows an untrusted source to run arbitrary code on the host system. The source
encore.devis not in the trusted list provided in the security skill instructions. - [EXTERNAL_DOWNLOADS] (HIGH): The skill relies on third-party software and Homebrew taps from a non-whitelisted organization.
- Evidence:
brew install encoredev/tap/encore - Note: Per [TRUST-SCOPE-RULE], since
encoredevis not a trusted GitHub organization, this remains a high-severity finding for external dependency risk. - [COMMAND_EXECUTION] (MEDIUM): The skill facilitates the execution of local CLI tools that manage development servers and project configuration.
- Evidence:
encore app create,encore run, andencore db shell. - Risk: While these are functional requirements, they expand the attack surface if the downloaded binaries are compromised.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://encore.dev/install.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata