typescript-lsp
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADS
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill repeatedly invokes
bunx @plaited/development-skills. This command downloads and executes a package from the npm registry at runtime. - Evidence: The scripts
lsp-hover,lsp-symbols,lsp-refs,lsp-find, andlsp-analyzeall rely on executing code from the@plaitedorganization. - Trust Status: The
@plaitedorganization is not included in the list of 'Trusted GitHub Organizations' or 'Trusted GitHub Repositories'. Per the analysis framework, execution of unverifiable packages from non-trusted sources is classified as MEDIUM severity. - [DATA_EXPOSURE] (SAFE): The skill accesses local source code files (
*.ts,*.js, etc.) to provide LSP functionality. There is no evidence of attempts to access sensitive system files, environment variables, or credentials. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill processes untrusted external data (source code files) and produces structured JSON output for an agent. While this creates a potential surface for injection if an attacker-controlled file is scanned, the risk is inherent to the tool's purpose and the output is structured data.
- Ingestion points: Processes files matching
*.ts, *.tsx, *.js, *.jsxvia LSP tools. - Boundary markers: Output is formatted as JSON, which provides basic structural delimiters.
- Capability inventory: Uses
Bashviabunxto run analysis scripts. - Sanitization: No specific sanitization or 'ignore instructions' markers are mentioned in the skill definition.
Audit Metadata