Bun Hono Integration
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The skill contains hardcoded credentials within its code examples. \n
- Evidence: SKILL.md contains
password: "secret"andtoken: "my-token"within the 'Built-in Middleware' section. These specific strings, while intended as examples, trigger high-severity credential safety violations. \n- [COMMAND_EXECUTION] (LOW): The skill utilizes standard command-line tools for environment setup and execution. \n - Evidence: Examples include
bun create,bun install, andbun run dev. \n- [EXTERNAL_DOWNLOADS] (SAFE): The skill instructs the agent to download dependencies using a trusted package manager. \n - Evidence:
bun installis used to fetch the Hono framework and its associated validators. \n- [Indirect Prompt Injection] (LOW): The skill exposes surfaces that ingest untrusted data from external sources. \n -
- Ingestion points:
c.req.param("id"),c.req.query(), andc.req.json()in SKILL.md. \n
- Ingestion points:
-
- Boundary markers: Absent in routing and request handling sections. \n
-
- Capability inventory: Local server hosting and request processing capabilities. \n
-
- Sanitization: The skill demonstrates proper use of Zod schema validation (
zValidator) to sanitize inputs in specific sections.
- Sanitization: The skill demonstrates proper use of Zod schema validation (
Recommendations
- AI detected serious security threats
Audit Metadata