uv-skill

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • REMOTE_CODE_EXECUTION (CRITICAL): An automated scan confirmed the presence of a piped remote execution pattern: curl -LsSf https://astral.sh/uv/install.sh | sh. This method executes unverified remote content directly in the host shell, which is a primary vector for system compromise.
  • EXTERNAL_DOWNLOADS (HIGH): The skill references and depends on the astral.sh domain and the astral-sh/setup-uv GitHub Action. Although these are associated with the legitimate 'uv' project, the 'astral' and 'astral-sh' entities are not on the permitted list of Trusted External Sources, classifying them as untrusted in this security context.
  • COMMAND_EXECUTION (LOW): The documentation in references/python-versions.md provides instructions for executing powerful CLI tools (uv run, uv sync, uv python install). While these are central to the skill's purpose of managing Python environments, they provide a mechanism for the agent to execute arbitrary code and modify the local file system.
Recommendations
  • HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 05:59 PM