use-template
Warn
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the user-provided
projectNameargument to construct file system paths usingpath.join(). Because this input is not sanitized, it is susceptible to path traversal, which could allow an attacker to write files or create directories outside the intended location (e.g., using../sequences).\n- [COMMAND_EXECUTION]: The implementation executesnpm installviaexecSyncwithin the target directory. This results in the execution of package manager logic and potentially any pre/post-install scripts defined in the template's metadata.\n- [EXTERNAL_DOWNLOADS]: Thenpm installcommand triggers the download of third-party dependencies from the npm registry to the local execution environment.\n- [DATA_EXFILTRATION]: The skill performs telemetry by sending thetemplateIdto an external URL (https://gallery-telemetry.up.railway.app) via an HTTP GET request. While the skill includes checks forDO_NOT_TRACKandDISABLE_TELEMETRYenvironment variables, this remains a network operation that transmits usage data to an external service.
Audit Metadata