firebase-basics
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Remote Code Execution] (CRITICAL): The file
SKILL.mdcontains a command to download and execute a script directly from an external URL:curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.40.3/install.sh | bash. This piped execution pattern is highly dangerous as it grants the remote script full execution rights without prior inspection. The sourcenvm-shis not on the list of trusted GitHub organizations. - [Command Execution] (HIGH): The
SKILL.mdfile suggests usingsudoto resolveEACCESerrors during global npm installations. This practice promotes privilege escalation and unnecessarily increases the attack surface of the system. - [Indirect Prompt Injection] (LOW): The skill creates a surface for indirect prompt injection by facilitating the ingestion of user-controlled strings (Project IDs, app names) into CLI tool parameters without sanitization or boundary markers.
- Ingestion points: Project ID and display name prompts in
firebase projects:createandfirebase apps:createinSKILL.mdandreferences/web_setup.md. - Boundary markers: Absent; user inputs are interpolated directly into commands.
- Capability inventory: CLI execution for project management, authentication, and directory creation.
- Sanitization: None present.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/nvm-sh/nvm/v0.40.3/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata