onboarding-wizard
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection via the project's package.json file.
- Ingestion points: In
src/index.ts, the skill reads thepackage.jsonfile from the directory provided in thedirargument to extract thenamefield. - Boundary markers: The extracted project name is interpolated directly into a Markdown template in the
quickStartreturn value without any delimiters or instructions for the agent to ignore embedded commands. - Capability inventory: The skill generates Markdown output that is interpreted by the agent's core processing loop.
- Sanitization: There is no validation or escaping of the
projectNamevariable before it is placed into the Markdown string. - [COMMAND_EXECUTION]: The skill's library logic in
src/lib.tsgenerates a setup step recommending the user runnode scripts/init_wizard.cjs. This script is not present in the provided skill files, creating a risk where the skill might inadvertently encourage the execution of malicious code if the target repository has been compromised.
Audit Metadata