configure-package-management
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches installation scripts for
uvandbunfrom their official domains (astral.shandbun.sh). - [REMOTE_CODE_EXECUTION]: Installation procedures involve piping remote scripts directly to shell interpreters (
curl | shandcurl | bash) for tool setup. - [COMMAND_EXECUTION]: Uses dynamic context injection via the
!commandsyntax and theBashtool to perform project introspection and environment checks. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) as it ingests untrusted data from local project configuration files to guide its logic.
- Ingestion points: Configuration files such as
package.json,pyproject.toml, andCargo.tomllocated in the project root. - Boundary markers: Absent; the skill does not use delimiters or instructions to ignore embedded prompts in these files.
- Capability inventory: Includes
Bashfor command execution,WriteandEditfor file modification, andWebFetchfor external data retrieval. - Sanitization: None; the agent processes file contents directly without validation or escaping.
Audit Metadata