nextjs-app-router
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFE
Full Analysis
- [SAFE] Category 8: Indirect Prompt Injection (SAFE): The skill analyzes local Next.js project files using a shell script (
scripts/validate-structure.sh). - Ingestion points: Reads
.tsx,.ts, and.jsfiles within theapp/directory. - Boundary markers: Not applicable (standard file reading).
- Capability inventory: Uses
grep,find, andheadto validate code patterns (e.g., checking for 'use client' or root layouts). - Sanitization: The script uses double-quotes for file paths and standard utilities, preventing simple path-based command injection.
- [SAFE] Category 2: Data Exposure (SAFE): Code examples use placeholder URLs (
api.example.com) and reference environment variables (process.env.REVALIDATION_SECRET) for sensitive tokens, which is a security best practice. - [SAFE] Category 4: Remote Code Execution (SAFE): The included shell script performs local static analysis only. It contains no network operations, downloads, or unverified package installations.
- [INFO] Best Practices Note: An example in
examples/page-layout.tsxusesdangerouslySetInnerHTML. While appropriate for a CMS-style tutorial snippet, developers should be reminded to sanitize HTML content to prevent XSS in their final applications.
Audit Metadata