bun-development
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The skill uses a shell pipe to execute remote code directly. The command 'curl -fsSL https://bun.sh/install | bash' downloads a script and executes it immediately, which is a critical vulnerability.
- [EXTERNAL_DOWNLOADS] (HIGH): Downloads are sourced from 'https://bun.sh', which is not a recognized trusted provider according to security protocols.
- [COMMAND_EXECUTION] (HIGH): Executing piped input via bash bypasses file-system based security analysis and integrity checks, allowing arbitrary commands to run on the host.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata