oma-design
Warn
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on complex shell command pipelines in
resources/getdesign-fetcher.mdandresources/stitch-integration.mdto automate its workflow. These scripts use system utilities includingcurl,python3,tar,shasum,awk, andrm. For example, it pipescurloutput topython3for JSON parsing and usestarto extract specific files from downloaded tarballs. - [REMOTE_CODE_EXECUTION]: The skill executes external CLI tools directly from the npm registry using
npxandbunx. Specifically, it callsbunx getdesign@latestfor template management andnpx @_davideast/stitch-mcpfor optional design integration. Because these are unpinned (@latest), they present a supply-chain risk where a compromised upstream package could execute arbitrary code on the host system. - [EXTERNAL_DOWNLOADS]: The skill performs multiple external network requests to non-whitelisted domains to fetch metadata and design templates. It queries
https://registry.npmjs.org/getdesign/latestto resolve package URLs and downloads markdown templates from thegetdesign.mdvendor site. While the fetcher implementation includes integrity verification, the initial manifest retrieval and tool execution occur before these checks. - [PROMPT_INJECTION]: The skill identifies external design templates as a potential indirect prompt injection vector. It implements a defensive framing strategy in
resources/getdesign-fetcher.mdthat instructs the agent to treat fetched content as reference data and explicitly ignore any imperative or meta-instructions within the external files.
Audit Metadata