upgrading-expo
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): In
references/new-architecture.md, the skill suggests the commandbunx xcobra expo eval "_IS_FABRIC". The use ofxcobrais suspicious as it is not a recognized standard tool in the React Native or Expo ecosystems. Running unverified packages viabunxornpxcan lead to the execution of malicious code if the package name is typosquatted or contains a supply chain attack. - [EXTERNAL_DOWNLOADS] (LOW): The skill instructs the user to install external packages like
react-native-workletsandexpo-symbols. While these are often legitimate, the instruction to installreact-native-workletsspecifically for SDK 54+ should be verified against official Expo documentation. - [DATA_EXPOSURE] (SAFE): The
rm -rf node_modules .expocommand is a standard cleanup procedure for Expo projects and does not target sensitive user directories (like~/.ssh). - [INDIRECT_PROMPT_INJECTION] (LOW): The skill is designed to process and modify project configuration files (e.g.,
app.json,package.json). An attacker who successfully injects malicious instructions into these files could potentially influence the behavior of the agent when it performs these upgrade tasks. Evidence: - Ingestion points: Reads
app.json,package.json,babel.config.js, andmetro.config.js(referenced inSKILL.md). - Boundary markers: None present; the skill lacks explicit instructions to ignore embedded instructions within the project files it parses.
- Capability inventory: Includes shell command execution via
npx,bunx, and file system modifications (rm,cd). - Sanitization: No evidence of sanitization for the data read from project configuration files.
Audit Metadata