umbraco-quickstart
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill ingests untrusted user descriptions to drive a planning phase that has access to high-privilege tools including Bash and file system modification. It lacks boundary markers and sanitization, creating a surface where an attacker can inject instructions to execute malicious code during the build or validation steps. Ingestion: User build description; Capability: Bash execution; Boundaries: Absent; Sanitization: Absent.
- [Remote Code Execution] (HIGH): The skill initiates the installation of plugins from 'umbraco-backoffice-marketplace', which is an unverifiable external source. This allows for the download and execution of arbitrary code at runtime.
- [Credential Exposure] (HIGH): Hardcoded default credentials ('admin@test.com' / 'SecurePass1234') are used in the setup process. While designated for local development, hardcoded passwords in scripts represent an unsafe practice.
- [External Downloads] (MEDIUM): The skill clones repositories from 'https://github.com/umbraco/', which is not on the trusted sources list, and integrates this code into the workspace.
- [Dynamic Execution] (MEDIUM): The workflow involves running 'npm run build' and 'dotnet run' on code that is dynamically created or modified based on external input.
Recommendations
- AI detected serious security threats
Audit Metadata