javascript-sdk
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation in
references/tool-builder.mdincludes code examples that use the unsafeeval()function to execute expressions directly generated by the AI model. This creates a high risk of arbitrary code execution if the agent is manipulated into producing a malicious payload.\n- [COMMAND_EXECUTION]: The skill configuration inSKILL.mdrequests broad permissions for shell command execution vianpm,npx,node,pnpm, andyarn. These tools allow for the installation of software and execution of scripts on the host system, which could be abused to perform malicious actions.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its design. Ingestion points includeclient.runinputs, user messages, and file uploads. Capabilities include shell access, webhooks, and cloud-based code execution. Boundary markers and sanitization logic are absent from the provided examples, increasing the risk that the agent may obey instructions embedded in untrusted data.\n- [EXTERNAL_DOWNLOADS]: The skill facilitates the installation and use of the@inferencesh/sdkpackage. While this is a vendor-owned resource, the broad permission to use thenpmtool increases the attack surface for downloading and executing code from external registries.
Recommendations
- AI detected serious security threats
Audit Metadata