lint-and-validate
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
scripts/lint_runner.pyscript identifies and executes scripts defined in thepackage.jsonfile of the target project (specificallynpm run lint). Since this command executes arbitrary shell instructions defined by the project author, a malicious project can trigger the execution of unauthorized code on the agent's host system. - [REMOTE_CODE_EXECUTION] (HIGH): The skill uses
npxto invoke tools likeeslintandtsc. By default,npxwill attempt to download and execute packages from the npm registry if they are not found locally. An attacker could exploit this by specifying malicious dependencies or plugins in the project configuration that are then fetched and run by the agent. - [INDIRECT_PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to indirect injection through project-level configuration files which act as untrusted ingestion points.
- Ingestion points: Reads
package.json,pyproject.toml, andrequirements.txtfrom the project path provided as an argument tolint_runner.py. - Boundary markers: None. There are no delimiters or security checks to isolate the data in these configuration files from the execution environment.
- Capability inventory: The skill has access to
subprocess.runand theBashtool, allowing it to execute any command extracted from the configuration files. - Sanitization: None. The skill blindly extracts and executes the content of the
scriptssection inpackage.json.
Recommendations
- AI detected serious security threats
Audit Metadata