prd-v06-environment-setup
Fail
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes examples and instructions that pipe remote scripts directly into shell interpreters (
bashandsh). Specific examples include the installation scripts for thenvmandmiseversion managers. - [EXTERNAL_DOWNLOADS]: The skill references external URLs to fetch installation scripts and tools, including
raw.githubusercontent.com/nvm-sh/nvm/v0.39.0/install.sh,mise.jdx.dev/install.sh, andmise.run. - [COMMAND_EXECUTION]: The skill provides numerous instructions for the agent to execute system commands for environment setup, package management, and verification. This includes tools such as
brew,apt,npm,pip,go, andmake. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through its ingestion of external decision files.
- Ingestion points: The skill consumes data from technical stack selections (
TECH-*) and architecture decisions (ARC-*) to populate environment specifications inSKILL.md. - Boundary markers: No specific delimiters or warnings are used to isolate or ignore instructions embedded within these source files.
- Capability inventory: The skill documentation encourages the generation and execution of shell commands, file modifications, and package installations across all included files.
- Sanitization: There is no evidence of sanitization or validation of the input data from
TECH-orARC-files before it is interpolated into executable script templates.
Recommendations
- HIGH: Downloads and executes remote code from: https://mise.jdx.dev/install.sh, https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.0/install.sh - DO NOT USE without thorough review
Audit Metadata