bun-validator

Fail

Audited by Gen Agent Trust Hub on Apr 22, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: References the official Bun installation script to assist users with environment setup. Evidence: scripts/validate.py provides the command 'curl -fsSL https://bun.sh/install | bash' as a recommended fix if the Bun runtime is not detected.
  • [COMMAND_EXECUTION]: Executes the 'bun' binary to verify the installed version and ensure compatibility with workspace features. Evidence: scripts/validate.py utilizes subprocess.run(['bun', '--version']) to retrieve the current version string.
  • [PROMPT_INJECTION]: The skill processes untrusted data from project-local package.json files, which introduces a surface for indirect prompt injection. Ingestion points: scripts/validate.py reads and parses package.json files from the root and defined workspace directories. Boundary markers: Absent. Capability inventory: subprocess.run operations in scripts/validate.py. Sanitization: Absent; the script parses JSON structure but does not sanitize the content of fields before processing or display.
Recommendations
  • HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 22, 2026, 07:31 AM