shadcn-inertia
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Unverifiable Dependencies & Remote Code Execution] (LOW): The skill instructs the user to run
npx shadcn@latest init. While this is the standard and intended workflow for the shadcn/ui library, it involves downloading and executing code from the npm registry. The severity is lowered because this is the primary purpose of the skill. - [Indirect Prompt Injection] (LOW): The skill provides patterns for processing untrusted data from the server (flash messages and form errors).
- Ingestion points:
usePage().flashis used inreferences/flash-toast.mdto retrieve messages from the Rails backend. - Boundary markers: No explicit boundary markers or 'ignore' instructions are provided for the toast content.
- Capability inventory: The skill uses
@inertiajs/react'srouterfor navigation and server-side actions (GET, POST, DELETE) inreferences/components.md. - Sanitization: Standard React component rendering is used, which provides default protection against XSS, though specific sanitization of flash strings is not explicitly detailed.
Audit Metadata