how-to-run-astro-ssr-and-pocketbase-on-the-same-server
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill utilizes
npm create astro@latest, which downloads and executes unverified scripts from the public NPM registry at runtime. - EXTERNAL_DOWNLOADS (MEDIUM): Installation of dependencies via
npm installandgo mod tidyfrom non-whitelisted sources (NPM and GitHub) without integrity verification or version pinning poses a supply chain risk. - COMMAND_EXECUTION (LOW): Standard environment setup operations including directory creation and package initialization.
- PROMPT_INJECTION (HIGH): (Category 8: Indirect Prompt Injection) The provided code in
www/src/pages/[...slug].astroimplements an insecure pattern allowing filter injection. * Ingestion point:Astro.params.sluginwww/src/pages/[...slug].astro. * Boundary markers: Absent. * Capability inventory:pb.collection('items').getList(Database Read). * Sanitization: Absent; the code directly interpolates a URL segment into a database filter string (id = '${id}'), allowing malicious users to manipulate queries.
Recommendations
- AI detected serious security threats
Audit Metadata