vscode-theme
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (MEDIUM): The skill ingests untrusted user input (theme names, color preferences) and uses them to generate configuration files and execute shell commands.
- Ingestion points: Step 1 (Gathering theme requirements).
- Boundary markers: None present in the instructions.
- Capability inventory: Executes
nodefor building/packaging andcode --install-extensionfor modifying the IDE environment. - Sanitization: Not explicitly documented in the skill instructions; relies on the internal logic of
theme-builder.js. - [External Downloads] (LOW): The skill requires the installation of the
@vscode/vscepackage via npm. - [TRUST-SCOPE-RULE]: This is downgraded to LOW as
@vscodeis a trusted organization representing official Visual Studio Code tools. - [Metadata Poisoning] (INFO): An automated scanner flagged
list.acas a malicious URL. This is a false positive. The string occurs within the VSCode theme propertylist.activeSelectionBackgroundin theparts/colors-ui.jsondocumentation section. - [Dynamic Execution] (MEDIUM): The skill dynamically generates a
.vsixextension file and installs it into the user's VSCode instance. While this is the stated purpose of the skill, the ability to inject code into the IDE via extensions is a significant capability that should be used with caution.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata