nx-monorepo
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The scripts
scripts/nx-docs.shandscripts/nx-plugins.shexecutenpx -y nx-mcp@latest. This pattern downloads and executes code from the public npm registry every time the tool is invoked without version pinning or integrity checks. This allows an attacker who gains control of the npm package to execute arbitrary code on the host system. - COMMAND_EXECUTION (MEDIUM): In
scripts/nx-docs.sh, the$QUERYvariable is interpolated directly into a JSON string passed as a command-line argument:-p "{\"userQuery\": \"$QUERY\"}". A crafted query containing escaped double quotes or other shell-sensitive characters could lead to JSON malformation or shell injection, depending on howmcp-client.py(which is referenced but not provided) handles arguments. - INDIRECT_PROMPT_INJECTION (MEDIUM):
- Ingestion points: The skill ingests untrusted data through
nx-docs.sh(user queries/external docs) and by reading project configuration files (project.json,nx.json). - Boundary markers: None identified in the provided scripts or prompts.
- Capability inventory: The skill has significant execution capabilities, including
nx build,nx test,nx run-many, andnx g(code generation), which can execute arbitrary shell commands defined in workspace configurations. - Sanitization: There is no evidence of sanitization for the data retrieved from the
nx-mcpdocumentation tool before it is processed by the agent. - EXTERNAL_DOWNLOADS (MEDIUM): The skill encourages connecting to 'Nx Cloud' via
npx nx connect, which involves sending workspace metadata and build artifacts to a remote service. While a standard feature of Nx, users should be aware of the data exposure implications.
Recommendations
- AI detected serious security threats
Audit Metadata