atscript-ui-forms
Warn
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes a dynamic resolver (
@atscript/ui-fns) to transform string annotations into executable JavaScript functions using thenew Functionconstructor. - Evidence: As described in
references/dynamic-fields.md, annotations such as@ui.form.fn.*and@ui.form.validateare compiled at runtime into functions that produce form logic. - Risk: The documentation confirms that this process is not sandboxed and does not use an allow-list, meaning executed code has access to global objects like
windowandfetch. - [PROMPT_INJECTION]: The skill is susceptible to indirect injection because it processes external data and interpolates it into dynamic execution scopes without a security sandbox.
- Ingestion points: External data is ingested via the
:form-dataproperty and user inputs within the form fields (references/forms.md). - Boundary markers: Absent; the system does not use delimiters or warnings to prevent the execution of malicious instructions embedded in the data.
- Capability inventory: The skill possesses the capability to execute arbitrary JavaScript logic through its dynamic annotation resolver (
references/dynamic-fields.md). - Sanitization: No sanitization or filtering is applied to the input data before it is used within the dynamic function scopes.
- [EXTERNAL_DOWNLOADS]: The skill documentation instructs users to download and install various external Node.js packages and tools.
- Evidence: Installation commands in
SKILL.mdandreferences/getting-started.mdreference packages under the@atscriptscope and the use ofnpx skillsfor adding capabilities. - Context: These resources are part of the primary infrastructure provided by the author to support the skill's functionality.
Audit Metadata