clerk-auth
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Data Exposure & Exfiltration] (HIGH): The agent definition in
agents/clerk-setup.mdincludes commands likegrep -r 'CLERK' .env*andgrep -r 'CLERK' wrangler.jsoncthat automatically search for and read sensitive configuration and environment files to extract secrets. - [Command Execution] (MEDIUM): Multiple files (
agents/clerk-setup.md,commands/setup.md,templates/vite/package.json) use shell commands or Node.js environment variables to execute binaries likenpm,npx, andwrangler, or to modify server configuration (NODE_OPTIONS). - [Credentials Unsafe] (MEDIUM): The script
scripts/generate-session-token.jsand various setup guides require the use ofCLERK_SECRET_KEY. While necessary for functionality, the utility script transmits these secrets to the external Clerk API (api.clerk.com), which is not on the trusted whitelist.
Recommendations
- AI detected serious security threats
Audit Metadata