project-setup
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The file
reference/python.mdcontains the commandcurl -LsSf https://astral.sh/uv/install.sh | sh. This pattern downloads and executes arbitrary code directly from a remote source, which is a high-risk vector for system compromise. - PROMPT_INJECTION (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) due to its fallback workflow.
- Ingestion points:
SKILL.mdinstructs the agent to perform a web search for unknown languages. - Boundary markers: None present; the agent is not warned to ignore instructions embedded in search results.
- Capability inventory: Across
reference/python.mdandreference/typescript.md, the skill performs file writes, executes shell commands, and installs packages. - Sanitization: None present; data from the web search is interpolated directly into the setup workflow.
- EXTERNAL_DOWNLOADS (SAFE): The skill references standard development dependencies from PyPI and npm registries (e.g., ruff, pytest, vitest, eslint) which are considered acceptable for the intended purpose of project bootstrapping.
Recommendations
- AI detected serious security threats
Audit Metadata