fe-scaffold
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill possesses an Indirect Prompt Injection surface because it ingests untrusted user input and uses it to perform file-system write operations.
- Ingestion points: Untrusted data enters the agent context through the
[이름](Name) and[타입](Type) variables derived from$ARGUMENTSas defined inSKILL.md. - Boundary markers: No delimiters or boundary markers are defined to isolate the user-provided names from the file path logic or the template code, nor are there instructions to ignore embedded commands.
- Capability inventory: Across all template sections (component, page, api, hook, store, feature, form), the agent is instructed to create directories and write files (e.g.,
src/components/[이름]/[이름].tsx). - Sanitization: The instructions lack any sanitization logic to prevent path traversal characters (e.g.,
../) or to escape code characters that could lead to script injection in the generated boilerplate. - Risk: An attacker could use a component name like
../../.ssh/authorized_keysto attempt unauthorized file writes or inject malicious code into a generated React component that executes in the developer's environment.
Recommendations
- AI detected serious security threats
Audit Metadata