ui-styling
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Remote Code Execution] (HIGH): The file
scripts/shadcn_add.pycontains logic to executenpx shadcn@latest add. This command downloads and executes code from the npm registry at runtime. In an AI agent context, executing remote code from unversioned or external registries without strict integrity checks is a high-risk pattern. Evidence:subprocess.run(['npx', 'shadcn@latest', 'add'] + components, ...)inscripts/shadcn_add.py.\n- [Command Execution] (MEDIUM): The skill performs command execution via thesubprocessmodule. Specifically,scripts/shadcn_add.pytakes a list of components fromsys.argvand passes them directly as arguments to an external process (npx). While using a list prevents traditional shell injection, it still allows an attacker to dictate which packages are downloaded and executed by the environment.\n- [External Downloads] (LOW): The skill instructions and quick-start guides explicitly direct the agent to download and install third-party packages and components from external URLs and registries (ui.shadcn.com, npm). This is downgraded to LOW per trust-scope rules for standard registries, but remains a notable risk factor when automated.\n- [Prompt Injection] (HIGH): The skill provides an attack surface for indirect prompt injection. It has an ingestion point via user/agent prompts for UI requirements and possesses high-privilege capabilities including command execution and project file modification. There are no boundary markers or sanitization logic to prevent malicious instructions embedded in UI requirements from being executed or influencing the generated code. Evidence: Lack of input validation inshadcn_add.pyand ingestion of arbitrary component strings which are interpolated into executable commands.
Recommendations
- AI detected serious security threats
Audit Metadata