astro-blog
Warn
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The file
AUDIT_PROMPT.mddirects the agent to execute a series of shell commands, includinggrep,awk,find, andjq. These are used to parse project frontmatter and analyze bundle sizes in thedist/directory.\n- [COMMAND_EXECUTION]: The skill instructs the agent to create a local bash script (audit-blog-post.sh) and usechmod +xto grant it execution permissions, which involves modifying file system privileges to execute unverified script logic.\n- [PROMPT_INJECTION]: Inreferences/human-voice.mdandreferences/validation.md, the agent is instructed to bypass AI detection mechanisms by utilizing 'Intentional Imperfections.' This includes purposely misspelling words like 'thier', 'recieve', and 'definately' to evade automated filters that distinguish between human and AI-generated content.\n- [REMOTE_CODE_EXECUTION]: The audit workflow requires the agent to install an external package (npm install -g lighthouse) and execute the CLI tool against a user-specified URL, which triggers remote data fetching and execution in a shell environment.\n- [EXTERNAL_DOWNLOADS]: The skill performs external downloads via thenpmpackage manager to install the Lighthouse tool and manage project dependencies during thenpm run buildphase.
Audit Metadata