using-dotnet

Fail

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill fetches the official .NET installation script from Microsoft's domain (https://dot.net/v1/dotnet-install.sh).
  • [COMMAND_EXECUTION]: The skill executes the .NET SDK installation script through the system shell and utilizes the dotnet CLI for running file-based applications.
  • [REMOTE_CODE_EXECUTION]: The skill employs a curl | bash pattern to install the .NET SDK from a trusted source, facilitating the execution of a remote script.
  • [PROMPT_INJECTION]: The skill implements routing logic that triggers based on keywords in user prompts and repository metadata such as .sln and .csproj files. This creates an indirect prompt injection surface. Ingestion points: User prompt text and repository signals identified in SKILL.md. Boundary markers: Not present. Capability inventory: Shell execution of curl, bash, and dotnet as defined in SKILL.md. Sanitization: No evidence of input validation or content filtering is provided before the routing decisions are made.
Recommendations
  • HIGH: Downloads and executes remote code from: https://dot.net/v1/dotnet-install.sh - DO NOT USE without thorough review
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 10, 2026, 03:17 PM