using-dotnet
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches the official .NET installation script from Microsoft's domain (https://dot.net/v1/dotnet-install.sh).
- [COMMAND_EXECUTION]: The skill executes the .NET SDK installation script through the system shell and utilizes the
dotnetCLI for running file-based applications. - [REMOTE_CODE_EXECUTION]: The skill employs a
curl | bashpattern to install the .NET SDK from a trusted source, facilitating the execution of a remote script. - [PROMPT_INJECTION]: The skill implements routing logic that triggers based on keywords in user prompts and repository metadata such as
.slnand.csprojfiles. This creates an indirect prompt injection surface. Ingestion points: User prompt text and repository signals identified inSKILL.md. Boundary markers: Not present. Capability inventory: Shell execution ofcurl,bash, anddotnetas defined inSKILL.md. Sanitization: No evidence of input validation or content filtering is provided before the routing decisions are made.
Recommendations
- HIGH: Downloads and executes remote code from: https://dot.net/v1/dotnet-install.sh - DO NOT USE without thorough review
Audit Metadata