skills/loonghao/vx/vx-usage/Gen Agent Trust Hub

vx-usage

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • PROMPT_INJECTION (LOW): The skill defines a surface for indirect prompt injection via the vx.toml configuration file. Findings include:\n
  • Ingestion points: The AI agent is instructed to read vx.toml to understand project requirements.\n
  • Boundary markers: None specified in the documentation to distinguish between configuration and embedded instructions.\n
  • Capability inventory: The skill allows the agent to execute arbitrary commands through the vx tool (e.g., vx run <script>, vx <tool>), install tools, and modify the development environment.\n
  • Sanitization: No mention of sanitizing or validating the contents of vx.toml before execution.\n- EXTERNAL_DOWNLOADS (LOW): The skill references external resources for the 'vx' tool from an untrusted source account ('loonghao'). This includes the GitHub repository and Docker images which are not within the defined trusted scopes.\n- REMOTE_CODE_EXECUTION (LOW): The skill provides examples for using the GitHub Action loonghao/vx@main. Referencing a mutable branch (@main) from an untrusted source constitutes a remote code execution risk where the executed logic can be changed without notification.\n- COMMAND_EXECUTION (LOW): The core functionality relies on the AI agent executing arbitrary system commands via the vx tool. This specifically includes executing user-defined or project-defined scripts (e.g., vx run dev) which are sourced from the untrusted vx.toml file.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:45 PM