use-template
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes
npm installusingexecSyncwithin the newly created project directory. This is a high-risk operation becausenpmcan execute arbitrary code through lifecycle scripts (e.g.,preinstall,postinstall) defined in the template'spackage.jsonfile. - [COMMAND_EXECUTION]: The
projectNameargument, provided by the agent or user, is used directly inpath.jointo construct file system paths without any sanitization or validation. This vulnerability allows for path traversal attacks (e.g., using../), which could enable the skill to write files or execute commands in directories outside of the intended project scope. - [EXTERNAL_DOWNLOADS]: The implementation includes a telemetry feature that makes an outbound network request to
https://gallery-telemetry.up.railway.appusinghttps.get. While the code respectsDO_NOT_TRACKenvironment variables, it communicates with an external service that is not part of the trusted or well-known service lists.
Audit Metadata