fact-check
Warn
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill explicitly instructs the agent to use
npx <tool> --helpas valid evidence for claim verification. This allows the agent to download and execute arbitrary code from the NPM registry if the tool is not locally present. - [COMMAND_EXECUTION]: The skill performs several potentially dangerous shell operations, including
git push,uv run, andgh api. These commands are executed as part of the automated workflow after processing external information. - [DATA_EXFILTRATION]: The automated
git push -u origin HEADoperation could be used to exfiltrate data or commit malicious changes to the repository if the agent is influenced by untrusted external content. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its core function of processing untrusted web content.
- Ingestion points: WebFetch, WebSearch, and gh API tools (SKILL.md).
- Boundary markers: None provided for the fetched external content.
- Capability inventory: npx, uv run, git push, and gh api (SKILL.md).
- Sanitization: None described for processing external web content before use in prompts or commands.
- [EXTERNAL_DOWNLOADS]: The use of
npxinvolves downloading packages from the public NPM registry at runtime, which poses a supply chain risk if the package name is derived from untrusted input.
Audit Metadata