tailadmin-nextjs
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill clones a repository from an untrusted source (https://github.com/Eng0AI/tailadmin-nextjs-template.git). This source is not part of the trusted organizations list, posing a risk of malicious content ingestion.
- REMOTE_CODE_EXECUTION (HIGH): The workflow executes 'pnpm install' and 'pnpm build' immediately after cloning the external repository. This is a classic 'download then execute' pattern where preinstall/postinstall scripts or build-time code execution in the untrusted repo can compromise the host.
- CREDENTIALS_UNSAFE (MEDIUM): The deployment section uses the '$VERCEL_TOKEN' environment variable. While not hardcoded, it encourages passing sensitive tokens into the agent's execution environment.
- COMMAND_EXECUTION (LOW): The skill performs file system operations like 'rm -rf' and 'mv', which are standard for setup but could be dangerous if manipulated by malicious input paths.
Recommendations
- AI detected serious security threats
Audit Metadata