openrouter-typescript-sdk
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: In the 'Tool System' section of
SKILL.md, the documentation provides an example of acalculatorToolthat useseval(expression)to perform calculations. Usingeval()on strings generated by an LLM or provided by external users is a dangerous practice that allows for arbitrary JavaScript execution within the host environment. - [REMOTE_CODE_EXECUTION]: The inclusion of the
eval()pattern in thecalculatorToolexample establishes a vulnerability surface where malicious input could be executed as code. If an agent adopts this pattern for its own tools, it creates a direct path for remote code execution (RCE). - [EXTERNAL_DOWNLOADS]: The skill instructs users to install the
@openrouter/sdkpackage from the npm registry. This is the official SDK from the vendor 'OpenRouterTeam' and is documented as a standard dependency. - [PROMPT_INJECTION]: The skill is a documentation resource and contains an attack surface for indirect prompt injection in
SKILL.md. - Ingestion points: The
callModelfunction accepts arbitraryinputstrings and multimodal content (images/URLs) which are processed by the underlying AI models. - Boundary markers: The provided examples do not demonstrate the use of delimiters or 'ignore' instructions for external data.
- Capability inventory: The skill facilitates network operations to the OpenRouter API and demonstrates local code execution capabilities via tools.
- Sanitization: The examples do not include sanitization or validation logic for the input processed by the models or executed by tools like the
calculatorTool.
Audit Metadata