expo-architect
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/init-expo.pyperforms extensive file system operations, including directory creation and file writing. It includes an--allow-outsideflag that explicitly permits the agent to create or overwrite files outside the current working directory, which poses a risk of unauthorized modification of sensitive files if the agent is manipulated via prompt injection. - [DYNAMIC_EXECUTION]: The scaffolding script generates React Native code (
.tsx) and configuration files by interpolating user-provided inputs (--name,--tabs) into string templates. There is no sanitization of thetabsnames, which are used directly in component names and file paths. This could lead to code injection in the generated app or path traversal if a user provides a tab name containing directory navigation characters (e.g.,../../). - [EXTERNAL_DOWNLOADS]: The generated
package.jsonincludes dependencies from the official NPM registry, including Expo SDK, React Native, and Clerk. These are well-known and standard dependencies for the mobile development use case. - [DATA_EXPOSURE]: The skill generates patterns for handling authentication using Clerk, including session token management in
lib/api.ts. While it uses standard environment variable patterns (EXPO_PUBLIC_CLERK_PUBLISHABLE_KEY), it establishes a framework for handling sensitive user credentials.
Audit Metadata