skills/nrwl/nx/dist-build-migration/Gen Agent Trust Hub

dist-build-migration

Pass

Audited by Gen Agent Trust Hub on May 8, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes shell commands to interact with the Nx CLI (pnpm nx) and executes a local script (node ./scripts/copy-readme.js). While standard for development workflows, this involves the execution of code found within the repository.
  • [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection. It instructs the agent to read various configuration files (e.g., package.json, project.json, tsconfig.json) from the workspace and perform actions based on their contents. Maliciously crafted content within these files could potentially influence the agent's logic during the migration process.
  • Ingestion points: Files like packages/<name>/package.json, project.json, and others are read into the agent's context.
  • Boundary markers: None are specified to separate file content from the agent's instructions.
  • Capability inventory: The skill has access to Write, Edit, and Bash tools, allowing it to modify the filesystem and execute commands.
  • Sanitization: There is no mention of sanitizing or validating the contents of the files before processing them.
Audit Metadata
Risk Level
SAFE
Analyzed
May 8, 2026, 08:48 PM