e2e-gen
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The skill instructs the agent/user to run
npx ai-e2e-gen. This command downloads and executes a package from the npm registry provided by 'LXGIC Studios', which is an untrusted/unverified source. This is a classic 'download then execute' pattern. - [REMOTE_CODE_EXECUTION] (HIGH): The use of
npxfor an unverified package effectively grants the remote package author code execution privileges on the user's machine. There is no verification of the package's integrity or behavior before execution. - [COMMAND_EXECUTION] (MEDIUM): The skill relies on shell command execution to function. If the 'user flows' or 'URL' parameters are not strictly sanitized by the
ai-e2e-gentool, it may be vulnerable to command injection. - [INDIRECT_PROMPT_INJECTION] (MEDIUM): By allowing a
--urlparameter, the skill ingests content from external websites. An attacker could host a page with hidden instructions designed to manipulate the LLM's output, potentially leading to the generation of malicious test code or attempting to leak the requiredOPENAI_API_KEY.
Recommendations
- AI detected serious security threats
Audit Metadata