python-dev
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill's primary setup instructions and reference documentation (e.g.,
SKILL.md,references/uv-reference.md,references/ty-reference.md) explicitly recommend downloading and executing shell scripts from remote URLs (https://astral.sh/uv/install.shandhttps://astral.sh/ty/install.sh) by piping them directly intosh. This pattern is highly dangerous as it allows an external server to execute arbitrary commands on the host system without any integrity verification or review. - [COMMAND_EXECUTION]: The skill promotes the use of
justas a command runner anduv runfor various project tasks. The provided templates forJustfileandpyproject.tomlinclude recipes that execute shell commands, such asrm -rf,find ... -exec rm, and various tool invocations. While intended for development, this creates a mechanism for arbitrary command execution controlled by the configuration files. - [EXTERNAL_DOWNLOADS]: The skill facilitates the installation of multiple external tools and dependencies (e.g.,
uv,ty,ruff,pytest,just) from various remote sources, includingastral.shand GitHub repositories. Relying on scripts and packages from external, non-whitelisted domains introduces supply-chain risks where a compromise of the source could lead to system infection.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata