vibelexity

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (CRITICAL): The skill instructions in vibelexity.md and scripts/install-vibelexity.sh use unauthenticated 'curl | bash' and 'curl | sh' pipes to execute remote code from untrusted sources. Evidence: 'curl -fsSL https://raw.githubusercontent.com/ozozozd/vibelexity-claude-plugin/main/scripts/install-vibelexity.sh | bash' in vibelexity.md and 'curl -LsSf https://astral.sh/uv/install.sh | sh' in install-vibelexity.sh.
  • [COMMAND_EXECUTION] (HIGH): The skill executes arbitrary local binaries and dynamically downloaded scripts within the host environment.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): Dependencies and installer scripts are retrieved from external, non-verified domains including an individual GitHub account and astral.sh.
  • [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) due to its high-privilege capabilities when processing untrusted data. 1. Ingestion points: Local source files analyzed via the path argument in vibelexity.md. 2. Boundary markers: Absent; file paths are interpolated directly into shell strings. 3. Capability inventory: Shell command execution (bash), network access (curl), file system access. 4. Sanitization: Absent; no validation of directory contents or file names before execution.
Recommendations
  • CRITICAL: Downloads and executes remote code from untrusted source(s): https://astral.sh/uv/install.sh - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 06:03 AM