render-deploy
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): Detected piped shell execution for the Render CLI installer. Automated scan found
curl -fsSL https://raw.githubusercontent.com/render-oss/cli/main/bin/install.sh | sh. While this is the official installer, therender-ossorganization is not on the trusted list, and the execution method is a known high-risk vector. The severity is adjusted to HIGH as this pattern is associated with the primary purpose of the skill. - PROMPT_INJECTION (LOW): High surface for indirect prompt injection via project manifests. Ingestion points:
package.json,requirements.txt,pyproject.toml, andDockerfile(referenced inreferences/codebase-analysis.md). Boundary markers: Absent; the agent is not instructed to treat project file content as untrusted. Capability inventory: The skill can create web services, cron jobs, and execute shell commands. Sanitization: Absent; extracted build and start commands are used without validation. - COMMAND_EXECUTION (LOW): The skill utilizes local shell commands for service validation and log viewing.
references/deployment-details.mdlists commands likerender blueprints validateandrender services. - EXTERNAL_DOWNLOADS (LOW): References downloading the CLI and project-specific dependencies. Mentions
curlfor the CLI and various package managers (npm, pip, go) for dependencies during the build process.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/render-oss/cli/main/bin/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata