nx-monorepo
Fail
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs users to use
sudofor administrative operations, specifically adding a PPA and installing the Nx CLI globally on Linux systems (sudo add-apt-repository ppa:nrwl/nx,sudo apt install nx). This introduces a privilege escalation risk. \n- [EXTERNAL_DOWNLOADS]: The skill facilitates the installation and execution of external packages vianpxandnpm, and references third-party CI/CD components like GitHub Actions (nrwl/nx-set-shas@v4) and CircleCI orbs (nrwl/nx@1.7.0). These are from well-known sources. \n- [PROMPT_INJECTION]: The skill processes untrusted user-provided names for applications and libraries, which are then interpolated into shell commands without sanitization. \n - Ingestion points: User input for project, library, and component names used in generator commands (e.g.,
nx g @nx/react:app my-app). \n - Boundary markers: No delimiters or warnings are used to prevent the execution of embedded instructions in user input. \n
- Capability inventory: The skill uses
Bash,Write,Edit, andReadtools, providing a wide range of actions. \n - Sanitization: No input validation or escaping is performed on parameters before command execution.
Recommendations
- AI detected serious security threats
Audit Metadata