pp-dominos
Fail
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the agent to download and install the
dominos-pp-clitool usingnpx -y @mvanhorn/printing-press install dominos --cli-onlyandgo install github.com/mvanhorn/printing-press-library/library/food-and-dining/dominos/cmd/dominos-pp-cli@latest. These sources are outside of the trusted vendor scope. - [REMOTE_CODE_EXECUTION]: The installation methods involve executing code from remote registries.
npx -yautomatically downloads and runs packages from the NPM registry, whilego installfetches, compiles, and runs code directly from a GitHub repository. - [DATA_EXFILTRATION]: Every command in the CLI supports a
--deliver webhook:<url>flag, which allows the output (including customer addresses, order history, and loyalty tokens) to be POSTed to an arbitrary attacker-controlled URL. - [COMMAND_EXECUTION]: The skill relies on shell command execution to interact with the local Domino's CLI and manages a local SQLite database, providing the binary with access to the local file system.
- [CREDENTIALS_UNSAFE]: Authentication tokens are stored in plain text in the user's home directory at
~/.config/dominos-pp-cli/config.tomlfollowing a successful login.
Recommendations
- AI detected serious security threats
Audit Metadata