opentui
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill documents the installation of necessary development packages from the NPM registry, specifically @opentui/core, @opentui/react, @opentui/solid, react, and solid-js.- [REMOTE_CODE_EXECUTION]: Provides instructions for bootstrapping projects using
bunx create-tui@latest, which is the standard scaffolding tool for the OpenTUI platform.- [COMMAND_EXECUTION]: References standard system and runtime commands for development, includingbun run,bun test, and the installation of the Zig compiler for native builds.- [DATA_EXPOSURE]: Mentions the use of standard environment variables likeXDG_CONFIG_HOMEandXDG_DATA_HOMEfor managing application configuration paths.- [PROMPT_INJECTION]: The skill defines an attack surface for indirect prompt injection by documenting components that process user input (e.g.,<input>,<textarea>). - Ingestion points: Interactive components described in
references/components/inputs.md. - Boundary markers: None mentioned in documentation.
- Capability inventory: Access to shell execution through
Bun.$is noted inreferences/core/gotchas.md. - Sanitization: No specific sanitization methods for user input are provided in the references.
Audit Metadata