shopify
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
shopify_init.pyscript identifies and reads sensitive environment files to load configuration variables. It searches for.envfiles in the current working directory and its parents, specifically including the.claudeconfiguration directory. Accessing environment files outside the immediate project scope is a security concern as it may expose unintended credentials from the host environment. - [COMMAND_EXECUTION]: The
shopify_init.pyscript utilizessubprocess.runto execute theshopify versioncommand locally. This is used as a functional check to ensure the necessary CLI tools are installed. - [EXTERNAL_DOWNLOADS]: The skill documentation and initialization script refer to the installation and use of official Shopify CLI tools and npm packages. These resources originate from a well-known service (Shopify) and are documented neutrally as intended dependencies.
- [PROMPT_INJECTION]: The
shopify_init.pyscript collects user input through theinput()function and interpolates it into configuration templates (e.g.,shopify.app.toml) using f-strings without validation or escaping. This creates a vulnerability to indirect prompt injection or schema confusion if the generated files are subsequently read by an automated agent. - Ingestion points:
input()calls in theShopifyInitializer.promptandShopifyInitializer.select_optionmethods inscripts/shopify_init.py. - Boundary markers: None; user input is directly placed into double-quoted string fields in TOML and JSON templates.
- Capability inventory: The skill has the capability to write files (
Path.write_text) and execute subprocesses (subprocess.run) as seen inscripts/shopify_init.py. - Sanitization: No sanitization or validation of the input content is performed beyond a trailing whitespace
strip()call.
Audit Metadata