laravel-vite
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (HIGH): The mandatory 'Agent Workflow' in
SKILL.mdrequires agents to analyze untrusted codebase files (e.g.,vite.config.js,package.json) viaexplore-codebase. Given the agent's capability to implement configurations and execute build scripts, this facilitates a high-severity indirect prompt injection vulnerability where malicious data in the repository can subvert the agent's logic. Evidence: Ingestion point (SKILL.mdworkflow), missing boundary markers, and write/execute capabilities across multiple templates. - [External Downloads] (LOW): Templates in
setup.mdandInertiaSetup.mdrecommend standard npm packages (e.g.,vite,laravel-vite-plugin) from the official registry. Following the [TRUST-SCOPE-RULE], these are considered low risk as they originate from whitelisted/common sources. - [Command Execution] (MEDIUM): templates provide commands for building production assets (
npm run build) and configuring server-side rendering (SSR) via process managers likeSupervisorandPM2, which involve shell execution for persistence. - [Data Exposure] (LOW):
references/environment.mdprovides guidance on usingVITE_prefixes and includes explicit warnings against exposing sensitive data like API keys or passwords, aligned with security best practices.
Recommendations
- AI detected serious security threats
Audit Metadata