frontend-svelte
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The documentation includes standard commands for initializing the project and adding components using the
bunx shadcn-svelte@latestutility. - [COMMAND_EXECUTION]: The skill provides instructions for building and previewing the application using the Bun runtime with commands like
bun run buildandbun run preview. - [PROMPT_INJECTION]: An example provided for blog post rendering uses the
{@html}tag to display content from an external API, which serves as a potential surface for indirect injection if not handled with care. - Ingestion points: Content is fetched from an API endpoint (
/api/posts/${params.slug}) within the SvelteKitloadfunction and passed to the frontend for rendering. - Boundary markers: There are no explicit delimiters or instructions provided in the template to ignore or bypass embedded directives in the fetched HTML.
- Capability inventory: The use of
{@html}allows for the execution of client-side scripts or the rendering of arbitrary HTML elements, which could influence an agent's context if it parses the output. - Sanitization: The example documentation does not include logic for sanitizing the HTML string before rendering, which is a key security practice when using this directive.
Audit Metadata