ls-lint
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [Unverifiable Dependencies & Remote Code Execution] (HIGH): The skill suggests downloading a binary directly from an untrusted GitHub repository and executing it. \n
- Evidence:
curl -sL -o ls-lint https://github.com/loeffel-io/ls-lint/releases/download/v2.3.1/ls-lint-linux-amd64followed bychmod +x ls-lint. \n - Risk: The organization
loeffel-iois not on the trusted sources list. Downloading and executing unverified binaries is a significant security risk as it bypasses package registry safety checks. \n- [Privilege Escalation] (MEDIUM): The skill instructs the agent to grant execution permissions to a downloaded file usingchmod +x. \n - Evidence:
chmod +x ls-lintin the installation section. \n- [Indirect Prompt Injection] (LOW): The skill processes untrusted data from the local filesystem (file and directory names) which could potentially be crafted to influence agent behavior or exploit vulnerabilities in the linter binary. \n - Ingestion points: Filesystem paths and names processed by
ls-lint(SKILL.md). \n - Boundary markers: Absent. \n
- Capability inventory: Execution of
ls-lintbinary andnpxcommands which read local filesystem data. \n - Sanitization: None specified.
Recommendations
- AI detected serious security threats
Audit Metadata