open-gstack-browser
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill contains logic to install the 'bun' runtime if it is missing. It downloads an installation script from the official bun.sh website and executes it using bash.
- [EXTERNAL_DOWNLOADS]: Fetches the installation script for the 'bun' runtime from
https://bun.sh/install. The script implements an integrity check by comparing the SHA256 checksum of the downloaded file against a hardcoded value (bab8acfb046aac8c72407bdcce903957665d655d7acaa3e11c7c4616beae68dd) before execution. - [COMMAND_EXECUTION]: The preamble executes multiple shell commands to manage sessions, check updates, and handle configurations within the
~/.gstackand~/.claude/skills/gstackdirectories. This includes usingevalandsourceon output from local binaries such asgstack-slugandgstack-repo-modeto configure the environment. - [DATA_EXFILTRATION]: The skill implements telemetry logging to track usage data such as skill name, duration, and session IDs. This data is stored locally and potentially sent to a remote endpoint. However, the skill explicitly requests user consent through an
AskUserQuestionprompt before enabling remote telemetry collection. - [PROMPT_INJECTION]: The skill instructions include directives such as "Treat the skill file as executable instructions, not reference" to guide the agent's behavior during plan mode. This is used to ensure the agent follows the complex setup and connection workflow correctly.
Audit Metadata