coding-standards
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The file
shell/scripts/install-shell-tools.shdownloads binary executables and source code from non-whitelisted GitHub repositories. - Evidence: Functions
install_shellcheck_binary,install_shfmt_binary, andinstall_bats_from_sourcedownload content fromgithub.com/koalaman,github.com/mvdan, andgithub.com/bats-corerespectively. - [REMOTE_CODE_EXECUTION] (HIGH): The script
shell/scripts/install-shell-tools.shexecutes setup scripts downloaded from the internet with elevated privileges. - Evidence:
install_bats_from_sourceclones thebats-corerepository and executessudo ./install.shdirectly. - [COMMAND_EXECUTION] (HIGH): Several scripts utilize
sudoto perform system-level modifications based on external data. - Evidence:
shell/scripts/install-shell-tools.shusessudo mv,sudo chmod, andsudo ./install.shto install tools into/usr/local/bin. - [EXTERNAL_DOWNLOADS] (LOW): The
python/resources/configs/.pre-commit-config.yamlfile depends on multiple external GitHub repositories to fetch and run pre-commit hooks at runtime. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill setup scripts ingest user-provided project names and package names without sanitization, potentially allowing local file system manipulation if an attacker provides a path-traversal string as a project name.
- Ingestion points:
PROJECT_NAMEargument inswift/scripts/setup-swift-project.sh,python/scripts/setup-project.sh, etc. - Boundary markers: Absent.
- Capability inventory: Scripts can create directories, write files, and initialize git repositories.
- Sanitization: None detected.
Recommendations
- AI detected serious security threats
Audit Metadata