upgrade-js-deps
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill utilizes
npx npm-check-updatesandmake npm-install, which download and execute code from the npm registry. This exposes the environment to supply-chain attacks or dependency confusion. - REMOTE_CODE_EXECUTION (HIGH): By running
make testandmake npm-buildafter modifying dependencies, the skill may execute arbitrary code introduced during the upgrade process via install scripts or test code. - COMMAND_EXECUTION (MEDIUM): The skill grants the agent authority to execute
makeandnpxwith wildcard parameters, providing a broad surface for command execution. - INDIRECT PROMPT INJECTION (HIGH): (Category 8) The skill processes untrusted output from external tools and package metadata. Ingestion points: SKILL.md logic processes tool output from npx and make. Boundary markers: None present. Capability inventory: Arbitrary subprocess execution via
makeandnpxtools. Sanitization: None detected. Malicious data in package versions or tool logs could subvert agent logic to perform unauthorized actions.
Recommendations
- AI detected serious security threats
Audit Metadata