check-endpoint-status
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill invokes
npx @zauthx402/cli@latest, which downloads and runs executable code from the npm registry at runtime. Since the@zauthx402scope is not a trusted organization, this allows for arbitrary code execution from an unverified remote source. - [EXTERNAL_DOWNLOADS] (HIGH): By using the
@latesttag, the skill is vulnerable to supply chain attacks. If the untrusted package is updated with malicious code, the agent will automatically download and execute the compromised version during its next run. - [COMMAND_EXECUTION] (MEDIUM): The
allowed-toolsconfiguration usesBashto run the CLI with a wildcard*. This indicates that the agent passes unsanitized user-provided input directly to a shell command, which could be exploited for command injection if the input is not a valid URL.
Recommendations
- AI detected serious security threats
Audit Metadata