pnpm
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- Remote Code Execution (CRITICAL): File
references/core-installation.mdcontains instructions for installing pnpm usingcurl -fsSL https://get.pnpm.io/install.sh | sh -andInvoke-WebRequest https://get.pnpm.io/install.ps1 | Invoke-Expression. These patterns execute remote, unverified scripts directly in the shell. - Persistence Mechanisms (HIGH): File
references/features-completion.mdprovides instructions to modify user shell profile files (such as~/.bashrcand~/.zshrc) to source completion scripts, which allows for persistent code execution in every new shell session. - Indirect Prompt Injection (HIGH): The skill is designed to process untrusted project data (e.g.,
package.json,pnpm-workspace.yaml,.npmrc) and possesses high-privilege execution capabilities likepnpm run,pnpm exec, andpnpm dlx. This creates a vulnerability where malicious instructions embedded in a project's metadata could influence agent behavior or execute commands. - Ingestion points: Reads
package.json,pnpm-workspace.yaml, and.npmrcfrom the local workspace. - Boundary markers: None identified in the instructional content.
- Capability inventory: Includes arbitrary command execution (
pnpm run), binary execution (pnpm exec), and remote package execution (pnpm dlx). - Sanitization: No evidence of sanitization for script names or package metadata before execution.
- Dynamic Execution (HIGH): Files
references/features-hooks.mdandreferences/features-finders.mddescribe the use of.pnpmfile.cjs, which allows for the execution of arbitrary JavaScript logic during the dependency resolution process. This mechanism can be exploited if an agent is tricked into running pnpm in a directory containing a malicious hook file. - Privilege Escalation (HIGH): File
references/core-installation.mdsuggests usingAdd-MpPreferenceto modify Windows Defender exclusions, which requires administrative privileges and reduces the system's security posture.
Recommendations
- AI detected serious security threats
Audit Metadata