freshworks-app-dev-skill
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Command Execution (HIGH): The files
.cursor/rules/validation-autofix.mdcand.cursor/rules/validation-workflow.mdcinstruct the AI agent to automatically execute shell commands (fdk validate). The instructions explicitly state that this "MUST happen automatically" and "DO NOT ask user to run it manually," which is a high-risk attempt to bypass the security boundary of user confirmation for code execution. - External Downloads (HIGH): The
README.mdrecommends usingnpx @freshworks-developers/freshworks_app_dev_skill. This pattern downloads and executes remote code from the npm registry from an organization (@freshworks-developers) that is not on the trusted external sources list. - Indirect Prompt Injection (LOW): The skill implements an automated "autofix" loop that ingests output from the
fdk validatecommand to influence subsequent code generation. - Ingestion points: Terminal output from the
fdk validateCLI command. - Boundary markers: None identified; the AI is instructed to "Parse validation output" directly.
- Capability inventory: Subprocess execution (terminal), file-write (autofixing), and network operations (request templates).
- Sanitization: No sanitization or escaping of the CLI output is defined before the AI processes it to generate new code.
- Command Execution (MEDIUM): The repository includes
scripts/cleanup_old_rules.sh, which usesrm -fto delete files. While the script targets specific rule names, automated deletion logic should be reviewed to prevent unintended data loss.
Recommendations
- AI detected serious security threats
Audit Metadata