knip-deadcode-best-practices

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • REMOTE_CODE_EXECUTION (HIGH): The file references/perf-use-bun-runtime.md contains instructions for installing the Bun runtime using high-risk patterns.
  • Evidence: curl -fsSL https://bun.sh/install | bash and powershell -c irm bun.sh/install.ps1 | iex.
  • Risk: Piping remote scripts directly into a shell is a dangerous practice that can lead to arbitrary code execution if the source or transport is compromised.
  • COMMAND_EXECUTION (LOW): The skill details the use of powerful CLI flags and file system operations within the context of codebase cleanup.
  • Evidence: knip --fix --allow-remove-files (file deletion), rm -rf node_modules/.cache/knip (directory removal).
  • Context: These commands are relevant to the skill purpose but require explicit user authorization.
  • PROMPT_INJECTION (LOW): The skill creates a surface for indirect prompt injection (Category 8).
  • Ingestion points: The agent is guided to process and act upon user-provided configuration files (knip.json, package.json) and source code.
  • Boundary markers: Absent.
  • Capability inventory: High. The agent is encouraged to run tool commands that can modify files and dependencies.
  • Sanitization: Partial. The skill recommends npm ci --ignore-scripts, which is a standard mitigation against malicious post-install scripts.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 05:47 PM