frontend-design
Warn
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill documentation in
references/design-md-format.mddescribes the use ofnpxto run commands such asdesign-md lintanddesign-md export. This provides a pattern for executing shell commands via theBashtool. - [REMOTE_CODE_EXECUTION]: The instruction to use
npx design-mdconstitutes a remote code execution risk. The package is claimed to be a 'Google Labs' tool, yet no such official utility exists in public registries from that provider, making the package a potential target for supply chain attacks or typosquatting. - [EXTERNAL_DOWNLOADS]: The
npxutility triggers the download of code from the npm registry at runtime. While the skill also mentions well-known packages likeframer-motionandreact-window, the inclusion of the unverifieddesign-mdutility is a concern. - [PROMPT_INJECTION]: The workflow in
SKILL.mdrequires the agent to read and parse aDESIGN.mdfile from the project root, using its contents as the 'source of truth' for implementation. This ingestion of untrusted data from the user's environment represents an indirect prompt injection surface. - Ingestion points:
DESIGN.mdfile in the project root directory. - Boundary markers: No delimiters or warnings are specified to prevent the agent from obeying instructions embedded within the design token values.
- Capability inventory: The agent has access to powerful tools including
Bash,Write,Edit, andWebFetch, which could be misused if the agent is compromised by malicious content in the design file. - Sanitization: There is no evidence of sanitization or strict schema validation for the token data before it is used to generate code or influence agent behavior.
Audit Metadata