cron-gen

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • Unverifiable Dependencies & Remote Code Execution (HIGH): The skill's primary function is to execute npx ai-cron-gen. This command fetches and runs code from the npm registry at runtime. * Evidence: Found in Quick Start and Usage Examples (e.g., npx ai-cron-gen "every monday at 3pm"). * Risk: The package source (github.com/lxgicstudios/ai-cron-gen) is not a trusted entity. Malicious updates to this package could lead to arbitrary command execution on the user's machine.
  • Data Exposure & Exfiltration (MEDIUM): The skill requires an OPENAI_API_KEY to function. * Evidence: 'Requirements' section states 'OPENAI_API_KEY required.' * Risk: Since the execution logic is contained within an external unverified package, the API key could be intercepted or sent to an attacker-controlled server.
  • Indirect Prompt Injection (MEDIUM): The skill accepts natural language strings as input for processing. * Ingestion points: Command-line arguments passed to the npx command. * Boundary markers: None. * Capability inventory: The npx command provides a full shell environment to the external package. * Sanitization: None visible in the skill definition; sanitization depends entirely on the external package's implementation.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 08:32 AM