modern-python
Fail
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The documentation in
references/security-setup.mdprovides an installation command that pipes a remote shell script directly to a shell interpreter:curl ... https://github.com/j178/prek/releases/latest/download/prek-installer.sh | sh. This pattern is high-risk because the source repository belongs to an unverified third-party user (j178) rather than a trusted organization or well-known service. - [COMMAND_EXECUTION]: The migration guide in
SKILL.mdincludes a shell loop that reads lines fromrequirements.txtand passes them as arguments to theuv addcommand. This represents an indirect command injection surface (Category 8) where malicious content in the input file could influence tool behavior or attempt to exploit the shell environment. - [EXTERNAL_DOWNLOADS]: The skill facilitates the download and execution of several external tools and templates. While resources from
astral-shandtrailofbitsare considered safe due to their well-known status, the suggested execution of a standalone installer from an unverified individual repository (j178/prek) does not meet safety standards for automated scripts.
Recommendations
- AI detected serious security threats
Audit Metadata