nuxt-terraform
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXPOSURE]: The skill's core instructions in
SKILL.mddirect the AI agent to parse the user's sensitive local configuration files, specifically~/.aws/credentialsand~/.aws/config, to facilitate AWS profile selection. - [CREDENTIALS_UNSAFE]: The
s3_private_storagemodule includes configuration to create IAM users and generate long-livedaccess_key_idandsecret_access_keyas Terraform outputs. Generating long-lived credentials instead of using IAM roles is a significant security risk. - [CREDENTIALS_UNSAFE]: The project initialization templates (
templates/init/envs/staging/outputs.tf.tpl) include sensitive outputs for AppSync API keys which will be stored in the Terraform state file. - [COMMAND_EXECUTION]: Several bundled scripts (
tf-run.ts,tf-output.ts) execute system commands usingspawnSyncto runterraform init,plan,apply, andoutputoperations. - [COMMAND_EXECUTION]: The
tf-lambda-build.tsscript programmatically invokesesbuildand thearchiverlibrary to compile and package Lambda functions from source code. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) as it ingests and processes data from external files to generate code.
- Ingestion points: The skill reads
schema.graphql,terraform-scaffold.config.ts, and local AWS configuration files. - Boundary markers: None are defined to separate untrusted data from generation instructions.
- Capability inventory: The skill has the capability to execute subprocesses (
terraform,aws,bun) and perform extensive file system write operations. - Sanitization: No sanitization or escaping is performed on the data interpolated into the generated code and Terraform templates.
Recommendations
- AI detected serious security threats
Audit Metadata