NYC

how-to-run-astro-ssr-and-pocketbase-on-the-same-server

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • REMOTE_CODE_EXECUTION (HIGH): The skill utilizes npm create astro@latest, which downloads and executes unverified scripts from the public NPM registry at runtime.
  • EXTERNAL_DOWNLOADS (MEDIUM): Installation of dependencies via npm install and go mod tidy from non-whitelisted sources (NPM and GitHub) without integrity verification or version pinning poses a supply chain risk.
  • COMMAND_EXECUTION (LOW): Standard environment setup operations including directory creation and package initialization.
  • PROMPT_INJECTION (HIGH): (Category 8: Indirect Prompt Injection) The provided code in www/src/pages/[...slug].astro implements an insecure pattern allowing filter injection. * Ingestion point: Astro.params.slug in www/src/pages/[...slug].astro. * Boundary markers: Absent. * Capability inventory: pb.collection('items').getList (Database Read). * Sanitization: Absent; the code directly interpolates a URL segment into a database filter string (id = '${id}'), allowing malicious users to manipulate queries.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 02:45 AM