zero-build-frontend

Pass

Audited by Gen Agent Trust Hub on May 11, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADS
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Fetches core libraries including React, Tailwind CSS, htm, and Leaflet from well-known and trusted CDNs such as esm.sh, unpkg.com, and cdn.tailwindcss.com. These are established services for front-end asset delivery.
  • [DATA_EXFILTRATION]: Provides logic for a browser extension to manage Bitly API tokens. The code uses chrome.storage.sync for persistence and fetch to communicate with the official Bitly API (api-ssl.bitly.com). The implementation uses password-masked inputs and lacks hardcoded credentials, following standard development practices.
  • [COMMAND_EXECUTION]: The browser extension snippet utilizes chrome.scripting.executeScript to perform clipboard operations on active tabs. While this involves executing functions in a web page context, it is a restricted and standard implementation for the 'copy to clipboard' feature in extensions.
  • [SAFE]: Data ingestion patterns for maps and archive explorers use template literals to render content from external sources (JSON and Google Sheets CSV) without explicit sanitization. This creates a surface for Indirect Prompt Injection or XSS if the data source is compromised.
  • Ingestion points: loadData in index.js, loadData in MapApp, and refresh in DataManager.
  • Boundary markers: Absent; data is directly interpolated into HTML strings.
  • Capability inventory: The skill uses fetch for network requests and localStorage for client-side persistence.
  • Sanitization: Absent; content like ${item.description} and ${item.name} is rendered directly into the DOM.
Audit Metadata
Risk Level
SAFE
Analyzed
May 11, 2026, 01:24 AM