check-endpoint-status

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (HIGH): The skill invokes npx @zauthx402/cli@latest, which downloads and runs executable code from the npm registry at runtime. Since the @zauthx402 scope is not a trusted organization, this allows for arbitrary code execution from an unverified remote source.
  • [EXTERNAL_DOWNLOADS] (HIGH): By using the @latest tag, the skill is vulnerable to supply chain attacks. If the untrusted package is updated with malicious code, the agent will automatically download and execute the compromised version during its next run.
  • [COMMAND_EXECUTION] (MEDIUM): The allowed-tools configuration uses Bash to run the CLI with a wildcard *. This indicates that the agent passes unsanitized user-provided input directly to a shell command, which could be exploited for command injection if the input is not a valid URL.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 11:36 PM