svelte-code-writer
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill uses
npxto download and execute the@sveltejs/mcppackage. Although this is a standard development workflow, it involves executing code from a remote registry at runtime. - [COMMAND_EXECUTION] (LOW): The skill triggers CLI commands through
npx. It correctly identifies and provides mitigation for shell injection risks by instructing the user to escape$characters (e.g.,\$state) when passing code as terminal arguments. - [PROMPT_INJECTION] (LOW): This skill exhibits an indirect prompt injection surface as it ingests and analyzes arbitrary Svelte code.
- Ingestion points: User-provided code strings or file paths passed to the
svelte-autofixercommand inSKILL.md. - Boundary markers: Uses double and single quotes as delimiters in command examples.
- Capability inventory: Execution of CLI tools via
npxto perform code analysis and documentation retrieval. - Sanitization: Includes explicit instructions for shell character escaping to prevent command/variable substitution.
Audit Metadata