knip-deadcode-best-practices
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The file references/perf-use-bun-runtime.md contains instructions for installing the Bun runtime using high-risk patterns.
- Evidence: curl -fsSL https://bun.sh/install | bash and powershell -c irm bun.sh/install.ps1 | iex.
- Risk: Piping remote scripts directly into a shell is a dangerous practice that can lead to arbitrary code execution if the source or transport is compromised.
- COMMAND_EXECUTION (LOW): The skill details the use of powerful CLI flags and file system operations within the context of codebase cleanup.
- Evidence: knip --fix --allow-remove-files (file deletion), rm -rf node_modules/.cache/knip (directory removal).
- Context: These commands are relevant to the skill purpose but require explicit user authorization.
- PROMPT_INJECTION (LOW): The skill creates a surface for indirect prompt injection (Category 8).
- Ingestion points: The agent is guided to process and act upon user-provided configuration files (knip.json, package.json) and source code.
- Boundary markers: Absent.
- Capability inventory: High. The agent is encouraged to run tool commands that can modify files and dependencies.
- Sanitization: Partial. The skill recommends npm ci --ignore-scripts, which is a standard mitigation against malicious post-install scripts.
Recommendations
- AI detected serious security threats
Audit Metadata