haloy-config

Fail

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • REMOTE_CODE_EXECUTION (HIGH): The skill is associated with an installation pattern that pipes a remote script from 'https://sh.haloy.dev/install-haloy.sh' directly into 'sh'. This is a high-risk pattern as it executes unverified code from an untrusted external source.
  • EXTERNAL_DOWNLOADS (MEDIUM): The skill references documentation and installation scripts from 'haloy.dev', which is not a verified or trusted organization per security protocols.
  • CREDENTIALS_UNSAFE (LOW): The generated examples produce configuration files with hardcoded placeholder credentials (e.g., 'POSTGRES_PASSWORD: "change-me-in-production"'). While placeholders, they represent a risk if used in production without user modification.
  • COMMAND_EXECUTION (LOW): The skill encourages the execution of local CLI commands such as 'haloy deploy' and 'haloy validate-config', which perform actions on the host system.
  • DATA_EXPOSURE (LOW): The skill logic involves reading local files including '~/.config/haloy/client.yaml' and project files like 'package.json' to extract configuration data.
  • INDIRECT_PROMPT_INJECTION (LOW): The skill has an attack surface for indirect injection by ingesting data from 'package.json' and 'prisma/schema.prisma'. It lacks explicit boundary markers or sanitization logic when processing these files to generate deployment commands.
Recommendations
  • HIGH: Downloads and executes remote code from: https://sh.haloy.dev/install-haloy.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 19, 2026, 01:24 AM