ts-agent-sdk
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill parses untrusted tool definitions and Zod schemas from
src/server/modules/mcp*/server.ts. Because the agent uses this data to generate and then suggest the execution of TypeScript scripts, a malicious actor could embed instructions in tool descriptions to compromise the system. - Ingestion points:
src/server/modules/mcp*/server.ts(tool names, descriptions, and schemas). - Boundary markers: None specified. The skill assumes tool definitions are safe to extract and interpolate directly into code templates.
- Capability inventory: The skill has file system write access to
./scripts/sdk/and triggers command execution vianpx tsxfor generated scripts. - Sanitization: No sanitization or validation of the extracted metadata is performed before it is used to generate executable code.
- Dynamic Execution (MEDIUM): The skill generates and promotes the execution of dynamic TypeScript code at runtime based on patterns it discovers in the project.
- Evidence: The workflow involves generating
client.tsandexamples/*.tsfiles using templates and extracted metadata, which are subsequently recommended for execution to interact with backend services.
Recommendations
- AI detected serious security threats
Audit Metadata