uv-skill
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): An automated scan confirmed the presence of a piped remote execution pattern:
curl -LsSf https://astral.sh/uv/install.sh | sh. This method executes unverified remote content directly in the host shell, which is a primary vector for system compromise. - EXTERNAL_DOWNLOADS (HIGH): The skill references and depends on the
astral.shdomain and theastral-sh/setup-uvGitHub Action. Although these are associated with the legitimate 'uv' project, the 'astral' and 'astral-sh' entities are not on the permitted list of Trusted External Sources, classifying them as untrusted in this security context. - COMMAND_EXECUTION (LOW): The documentation in
references/python-versions.mdprovides instructions for executing powerful CLI tools (uv run,uv sync,uv python install). While these are central to the skill's purpose of managing Python environments, they provide a mechanism for the agent to execute arbitrary code and modify the local file system.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata