shadcn-ui
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill frequently directs the agent to run commands such as
npx shadcn@latest add,bunx shadcn, andbun add. These commands execute external scripts and install packages from NPM. In a development environment, this is standard behavior, but it remains a primary vector for supply chain attacks if dependencies or the CLI tools themselves are compromised. - [EXTERNAL_DOWNLOADS] (MEDIUM): Workflows in
add-component.mdandcli-registry.mdexplicitly instruct the agent to install components from third-party URLs, specifically community registries athttps://shadcn.io/r/*.json. Since these are not official Radix or Shadcn core domains, they present a risk of downloading and injecting unverified code into the local project. - [REMOTE_CODE_EXECUTION] (LOW): The fundamental nature of the
shadcnCLI—which this skill automates—is to fetch remote component code and place it into the project's filesystem. This constitutes a remote code ingestion and execution surface that is inherently part of the tool's functionality but warrants caution when used with non-official registries.
Audit Metadata