shadcn-ui
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (HIGH): Multiple files (e.g.,
workflows/add-component.md,references/cli-registry.md,references/data-components.md) instruct the agent to execute commands that download components directly from external URLs. - Evidence:
npx shadcn@latest add https://www.shadcn.io/registry/gantt.jsonandbunx shadcn@latest add https://shadcn.io/r/kanban.json. - The domain
shadcn.iois not on the trusted external sources whitelist, and downloading/executing configuration or code from arbitrary URLs is a significant attack vector. - This finding is downgraded to MEDIUM as the behavior is central to the documented technology's primary purpose.
- Command Execution (MEDIUM): The skill frequently suggests executing powerful CLI commands like
npx shadcn,bun add, andbunx tscto manage the project environment. - While expected for a development tool, these capabilities grant the agent significant control over the local filesystem and build process.
- Indirect Prompt Injection (LOW): The skill has a defined ingestion surface where user requests are mapped to workflows that execute commands.
- Ingestion points: User intent selection in
SKILL.md. - Boundary markers: Absent.
- Capability inventory:
npx,bunx,bun add,navigator.clipboard.writeTextacross multiple workflow and reference files. - Sanitization: Absent. This creates a surface where a malicious user could potentially influence the agent to execute modified or unintended CLI commands.
Audit Metadata