ultracite
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The scripts
scripts/install-ultracite.shandscripts/migrate-to-ultracite.shuse theevalcommand to execute strings constructed at runtime from project metadata. This is a risky pattern that could be exploited if environment variables or project files likepackage.jsonare manipulated by an attacker.\n- EXTERNAL_DOWNLOADS (MEDIUM): Multiple files, includingreferences/mcp-integration.mdand the installation scripts, invokenpx,bun x, andpnpm dlxto download and execute theultraciteand@ultracite/mcp-serverpackages without version pinning. This leaves the development environment vulnerable to supply chain attacks or accidental execution of malicious packages if the names are ever squatted or hijacked.\n- COMMAND_EXECUTION (LOW): Documentation inreferences/git-hooks-setup.mdsuggests usingchmod +xon local scripts to set up Git hooks. While standard, it involves modifying file permissions to allow execution of scripts.\n- DATA_EXFILTRATION (LOW): Theultracite:doctorcommand and MCP server integration perform broad read operations on local project configuration files (package.json,biome.jsonc) and metadata. This establishes a surface for local data exposure within the agent's context.
Audit Metadata