ship-app
Warn
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The documentation instructs users to execute
sudo gem install cocoapodsandsudo gem install fastlane. Recommending the use ofsudofor tool installation constitutes a privilege escalation pattern, as it grants elevated permissions to installation scripts which could be exploited if package sources were compromised.\n- [COMMAND_EXECUTION]: Thescripts/setup.shscript performs multiple automated shell commands and writes configuration files (Appfile,Fastfile) to the local filesystem. This script executes with the permissions of the local environment.\n- [EXTERNAL_DOWNLOADS]: The skill performs project initialization and dependency management usingnpx @react-native-community/cli,npm install, andpod install. These commands fetch and execute external code from public registries, which is a standard part of the React Native development workflow.\n- [PROMPT_INJECTION]: The skill ingests an 'App Description' provided by the user to implement application logic, representing a vulnerability surface for indirect prompt injection.\n - Ingestion points: The
argument-hintfield inSKILL.md.\n - Boundary markers: None identified for user-provided input.\n
- Capability inventory: Access to
Bashshell tools and file manipulation capabilities (Write,Edit).\n - Sanitization: No validation or sanitization is performed on the ingested description text.
Audit Metadata