expo-deployment
Warn
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill repeatedly suggests running
npx testflightas a shortcut for iOS TestFlight submissions inSKILL.md,references/ios-app-store.md, andreferences/testflight.md. This command downloads and executes a package namedtestflightfrom the npm registry. Since there is no official Expo or Apple-provided CLI tool by this name (the current npm package of that name is an unrelated library), this instruction could lead to the execution of malicious code if the package name were targeted for typosquatting or hijacking.\n- [EXTERNAL_DOWNLOADS]: The documentation for dynamic metadata configuration inreferences/app-store-metadata.mdprovides an example of astore.config.jsfile that usesfetch()to retrieve data from an external API (https://api.example.com/app-store-copy). This pattern introduces a dependency on an external network resource during the build/deployment process, which could be exploited to exfiltrate sensitive environment variables or inject malicious configuration values if the endpoint is compromised.\n- [CREDENTIALS_UNSAFE]: The filereferences/app-store-metadata.mdcontains hardcoded credentials for a demo account (test@example.com/password123,ReviewDemo2025!). While intended for the App Review team, hardcoding credentials in configuration examples is a security risk as they may be accidentally committed to production repositories.\n- [COMMAND_EXECUTION]: The skill usesnpmandnpxto install and run global command-line tools such aseas-cli. Whileeas-cliis an official tool, the use ofnpxfor unverified packages liketestflightincreases the attack surface for dependency-based attacks.\n- [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection by pulling data from external sources and processing configuration files.\n - Ingestion points:
eas metadata:pullcommand described inreferences/app-store-metadata.mdretrieves metadata from external app store APIs.\n - Boundary markers: None identified in the provided instructions to separate pulled metadata from agent instructions.\n
- Capability inventory: Extensive command execution capabilities including
npm,npx, andfetchacross all scripts.\n - Sanitization: No evidence of input validation or sanitization before processing the pulled metadata content.
Audit Metadata