repo-orchestrator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill automatically executes
pnpm install. This is a significant security risk as it executes arbitrary lifecycle scripts (preinstall, postinstall) defined in the repository'spackage.jsonfile. \n- [EXTERNAL_DOWNLOADS] (MEDIUM): Usescorepack prepare pnpm@latest --activateto download and install the pnpm binary from remote sources. While corepack is a standard tool, it facilitates the execution of binaries fetched at runtime. \n- [REMOTE_CODE_EXECUTION] (HIGH): Significant Indirect Prompt Injection surface (Category 8). The skill reads and processes untrusted data from the local repository to make execution decisions. \n - Ingestion points:
package.json(specifically thedependencies,devDependencies, andpackageManagerfields). \n - Boundary markers: Absent. The agent is not instructed to ignore instructions inside the files it reads. \n
- Capability inventory: Full shell access to run
pnpm,git, andnode. \n - Sanitization: Absent. The
node -ecommand directly evaluates logic based on the raw content of thepackage.jsonfile.
Recommendations
- AI detected serious security threats
Audit Metadata