zero-build-frontend
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADS
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches core libraries including React, Tailwind CSS, htm, and Leaflet from well-known and trusted CDNs such as
esm.sh,unpkg.com, andcdn.tailwindcss.com. These are established services for front-end asset delivery. - [DATA_EXFILTRATION]: Provides logic for a browser extension to manage Bitly API tokens. The code uses
chrome.storage.syncfor persistence andfetchto communicate with the official Bitly API (api-ssl.bitly.com). The implementation uses password-masked inputs and lacks hardcoded credentials, following standard development practices. - [COMMAND_EXECUTION]: The browser extension snippet utilizes
chrome.scripting.executeScriptto perform clipboard operations on active tabs. While this involves executing functions in a web page context, it is a restricted and standard implementation for the 'copy to clipboard' feature in extensions. - [SAFE]: Data ingestion patterns for maps and archive explorers use template literals to render content from external sources (JSON and Google Sheets CSV) without explicit sanitization. This creates a surface for Indirect Prompt Injection or XSS if the data source is compromised.
- Ingestion points:
loadDatainindex.js,loadDatainMapApp, andrefreshinDataManager. - Boundary markers: Absent; data is directly interpolated into HTML strings.
- Capability inventory: The skill uses
fetchfor network requests andlocalStoragefor client-side persistence. - Sanitization: Absent; content like
${item.description}and${item.name}is rendered directly into the DOM.
Audit Metadata