riff
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses dynamic path resolution to locate its internal scripts. It derives
VIBES_ROOTfrom theCLAUDE_PLUGIN_ROOTenvironment variable or by navigating two levels up from the skill's directory (CLAUDE_SKILL_DIR). It subsequently executes local JavaScript files such asgenerate-riff.jsandassemble-all.jsusing thebunruntime via shell commands.\n- [PROMPT_INJECTION]: The skill exhibits a potential shell argument injection surface (Indirect Prompt Injection). User input for app themes and visual styles is collected via theAskUserQuestiontool and then interpolated intoBashcommands in Step 3. Ingestion points: Step 1AskUserQuestion(SKILL.md); Boundary markers: None; Capability inventory:Bash,Write,Read(SKILL.md); Sanitization: None.\n- [EXTERNAL_DOWNLOADS]: The skill's HTML templates (index.htmlandtemplate.delta.html) reference and load multiple JavaScript libraries and CSS frameworks from well-known services, includingunpkg.com,jsdelivr.net, andesm.sh(e.g., Babel, Tailwind, React). These are considered safe well-known technology providers.
Audit Metadata