developer-workflow
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (HIGH): The skill instructs the user to install the 'mise' tool using
curl https://mise.run | sh. Piping a remote script directly into a shell without verification is a critical security risk, as it allows for the execution of unverified and potentially malicious code from an external source. - Persistence Mechanism (HIGH): The skill automatically modifies the user's shell configuration (
~/.zshrc) to execute a 'mise activate' command on every new session. This ensures that the tool and its associated automated tasks are persistently loaded into the user's environment. - Command Execution (MEDIUM): The skill generates and sets executable permissions for git hooks (
commit-msg,pre-commit,pre-push) that executemise runcommands. This allows for automated, hidden command execution during routine version control operations. - External Downloads (LOW): The skill frequently uses
bunxanduv runto download and execute Node.js and Python packages at runtime. While common in development, these represent dynamic execution of remote code that could be subject to supply chain attacks.
Recommendations
- HIGH: Downloads and executes remote code from: https://mise.run - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata