nextjs-turborepo
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill refers to and provides examples for running utility scripts in the
scripts/directory, such asnextjs-init.pyandturborepo-migrate.py. Since these scripts are described as having the ability to modify the filesystem and migrate monorepos but are not provided in the skill package, their behavior is unverified and they could perform malicious actions if executed. - [PROMPT_INJECTION] (HIGH): The skill is highly susceptible to Indirect Prompt Injection (Category 8). Evidence: (1) Ingestion points: The skill accepts user-provided strings for project names and directory paths via command-line arguments like
--nameand--path. (2) Boundary markers: No boundary markers or 'ignore' instructions are present to encapsulate external data. (3) Capability inventory: The skill has extensive capabilities including shell command execution (npx,npm) and Python execution. (4) Sanitization: There is no evidence of input validation or escaping for these parameters, which could allow an attacker to inject shell metacharacters and execute arbitrary commands. - [REMOTE_CODE_EXECUTION] (LOW): The skill utilizes
npx create-next-app@latestandnpx create-turbo@latest. While these commands download and execute remote code from the npm registry, the tools are provided by a trusted source (Vercel), which downgrades the severity of this remote code execution finding to LOW per security policy. - [EXTERNAL_DOWNLOADS] (LOW): The skill downloads the
remixiconand@remixicon/reactpackages. These are standard UI dependencies from a trusted registry (npm) and are considered low risk.
Recommendations
- AI detected serious security threats
Audit Metadata