faion-javascript-developer
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The file
bun-runtime-simple/checklist.mdrecommends the commandcurl -fsSL https://bun.sh/install | bash. This is a critical remote code execution pattern that bypasses signature verification and executes an external script directly in the shell. While common for tool installation, the source is not in the pre-approved Trusted Sources list. - COMMAND_EXECUTION (MEDIUM): The skill provides instructions and examples for executing shell commands via Bun's native
$API and the agent'sBashtool (e.g.,await $ls -la`` inbun-runtime-simple/README.md). While appropriate for a developer skill, it increases the impact of potential injections. - PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8) because it ingests untrusted project data and possesses powerful write/execute capabilities.
- Ingestion points:
Read,Grep, andGlobtools are used to scanpackage.jsonand source code. - Boundary markers: Absent. The instructions do not specify delimiters or provide guidance to ignore instructions embedded within the analyzed code.
- Capability inventory:
Read,Write,Edit,Glob,Grep,Bash,Task,Skill. - Sanitization: Absent. There is no evidence of input validation or escaping for the data read from the filesystem before it is processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata