oidc-hosted-page-nextjs

Pass

Audited by Gen Agent Trust Hub on Feb 24, 2026

Risk Level: SAFECREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [CREDENTIALS_UNSAFE]: The implementation example in lib/oidc.ts includes a hardcoded client_id value ('cli_curf51oulvtc716e50eg.ad4a67ec19ac4507b744a1686ec9bff8.MGMpt3uV99Lftv5KkHF7pk') instead of a placeholder. While client identifiers are typically public, it is a security best practice to manage all application configuration via environment variables.
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the handling of external user input. Ingestion points: The login_hint parameter in app/api/auth/login/route.ts is obtained directly from the URL query string. Boundary markers: No delimiters or explicit instructions are provided to the agent or system to ignore embedded commands within the login_hint string. Capability inventory: The skill performs server-side redirects to an external identity provider using the openid-client library. Sanitization: No server-side validation or sanitization is performed on the login_hint before it is passed to the OIDC client library, which could be exploited for parameter injection.
  • [EXTERNAL_DOWNLOADS]: Recommends the installation of the openid-client library from the official npm registry, which is an established and well-known service for Node.js package management.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 24, 2026, 05:23 AM