haloy-config
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill is associated with an installation pattern that pipes a remote script from 'https://sh.haloy.dev/install-haloy.sh' directly into 'sh'. This is a high-risk pattern as it executes unverified code from an untrusted external source.
- EXTERNAL_DOWNLOADS (MEDIUM): The skill references documentation and installation scripts from 'haloy.dev', which is not a verified or trusted organization per security protocols.
- CREDENTIALS_UNSAFE (LOW): The generated examples produce configuration files with hardcoded placeholder credentials (e.g., 'POSTGRES_PASSWORD: "change-me-in-production"'). While placeholders, they represent a risk if used in production without user modification.
- COMMAND_EXECUTION (LOW): The skill encourages the execution of local CLI commands such as 'haloy deploy' and 'haloy validate-config', which perform actions on the host system.
- DATA_EXPOSURE (LOW): The skill logic involves reading local files including '~/.config/haloy/client.yaml' and project files like 'package.json' to extract configuration data.
- INDIRECT_PROMPT_INJECTION (LOW): The skill has an attack surface for indirect injection by ingesting data from 'package.json' and 'prisma/schema.prisma'. It lacks explicit boundary markers or sanitization logic when processing these files to generate deployment commands.
Recommendations
- HIGH: Downloads and executes remote code from: https://sh.haloy.dev/install-haloy.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata