tina-schema-sync
Warn
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DATA_EXFILTRATION]: The skill instructs the agent to output the first 10 characters of the
TINA_TOKENandNEXT_PUBLIC_TINA_CLIENT_IDto the terminal usingecho ... | head -c 10. This practice exposes portions of sensitive secrets in process logs and command history. - [COMMAND_EXECUTION]: The skill directs the execution of an external script
./scripts/pull-secrets.shwhich is not included in the skill's file set. The behavior of this script is unverifiable and could perform unauthorized actions. - [COMMAND_EXECUTION]: Uses
npx tinacms devto execute the TinaCMS CLI tool for artifact regeneration, which runs code from an external package. - [DATA_EXFILTRATION]: Instructs the agent to perform
git push, a network operation that transmits project artifacts and thetina-lock.jsonfile to a remote repository. - [CREDENTIALS_UNSAFE]: The skill accesses sensitive credentials from the
.env.localfile and injects them as environment variables into the shell environment.
Audit Metadata