add-feature
Warn
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill instructs the agent to fetch a setup guide from a personal GitHub Gist and execute the installation steps contained within. This pattern allows for arbitrary command execution guided by external, third-party content.
- Evidence:
styling.mddirects the agent to fetchhttps://gist.githubusercontent.com/infomiho/b35e9366e16913949e13eaba0538f553/raw/c6da98158c1a7e46b5874868f2e7c011f24d24d1/0-README.mdand "Follow the installation steps in the guide." - [EXTERNAL_DOWNLOADS]: The skill's workflow relies on fetching dynamic content and documentation from remote URLs at runtime to determine its actions.
- Evidence:
SKILL.md,authentication.md,database.md, andemail-provider.mdall contain instructions to fetch "raw GitHub doc URLs" or "Wasp docs" for configuration details. - [COMMAND_EXECUTION]: The primary function of the skill involves executing system commands and modifying local configuration files based on retrieved external guides.
- Evidence: instructions in
styling.mdto "Follow the installation steps in the guide" and "Restart the wasp app." - [DATA_EXFILTRATION]: While intended for configuration, the skill interacts with sensitive files like
.env.serverand configuration files, which could be targeted by modified external instructions. - Evidence:
email-provider.mdinstructs the agent to give instructions for adding environment variables to.env.server.
Audit Metadata