setup-python
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill instructs the agent to execute
curl -LsSf https://astral.sh/uv/install.sh | sh. Piped remote execution is a high-risk pattern because the content of the script can be changed by the host at any time to include malicious payloads. - Evidence: Found in
SKILL.md(Troubleshooting section) andreferences/DETAILED-WORKFLOW.md(Step 1). - Source Status:
astral.shis not on the Trusted External Sources list. - [COMMAND_EXECUTION] (HIGH): The skill performs extensive shell command execution including environment modification, tool installation, and running test suites which can be leveraged if combined with malicious local files.
- Evidence: Use of
uv pip install,ruff check,pytest, andmake allacross both files. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill downloads multiple external resources beyond the primary UV installer, including pre-commit hooks and Python versions.
- Evidence:
uv python install 3.12and pre-commit configuration inreferences/DETAILED-WORKFLOW.md(Step 10). - [INDIRECT PROMPT INJECTION] (HIGH): The skill has a significant attack surface as it processes untrusted data from local project files while maintaining full command execution capabilities.
- Ingestion points: Reads
pyproject.toml,requirements.txt, and.pre-commit-config.yaml(File:references/DETAILED-WORKFLOW.md). - Boundary markers: Absent. The skill treats the content of these files as trusted configuration.
- Capability inventory: Full shell access, dependency installation, and execution of local binaries via
pytestandmake(File:references/DETAILED-WORKFLOW.md). - Sanitization: Absent. No validation or filtering of the content inside the ingested configuration files before they influence shell commands.
Recommendations
- CRITICAL: Downloads and executes remote code from untrusted source(s): https://astral.sh/uv/install.sh - DO NOT USE
- AI detected serious security threats
Audit Metadata