cleanddd-dotnet-init
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill performs an external download by executing
dotnet new install NetCorePal.Template. This command fetches a project template from the public NuGet gallery. Such templates can contain arbitrary files and build-time scripts that execute locally during project generation or compilation. - COMMAND_EXECUTION (LOW): The
interactive_init.pyscript usessubprocess.runto execute the .NET CLI. While it correctly uses list-based arguments rather thanshell=Trueto prevent shell injection, the skill still performs significant system modifications, including directory creation and project scaffolding, based on input parameters. - INDIRECT_PROMPT_INJECTION (LOW): The skill identifies a surface for indirect prompt injection via the
IncludeCopilotInstructionsparameter. This flag explicitly injects instructions into the generated codebase intended to influence the behavior of downstream AI agents (like GitHub Copilot) that may process the project files later. - Ingestion points:
scripts/interactive_init.py(via--IncludeCopilotInstructionsflag). - Boundary markers: None (instructions are integrated directly into the generated project structure).
- Capability inventory:
subprocess.run(execution of dotnet CLI), filesystem writes. - Sanitization: No sanitization is performed on the instructions included in the template output.
Audit Metadata