bun-validator
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: References the official Bun installation script to assist users with environment setup. Evidence: scripts/validate.py provides the command 'curl -fsSL https://bun.sh/install | bash' as a recommended fix if the Bun runtime is not detected.
- [COMMAND_EXECUTION]: Executes the 'bun' binary to verify the installed version and ensure compatibility with workspace features. Evidence: scripts/validate.py utilizes subprocess.run(['bun', '--version']) to retrieve the current version string.
- [PROMPT_INJECTION]: The skill processes untrusted data from project-local package.json files, which introduces a surface for indirect prompt injection. Ingestion points: scripts/validate.py reads and parses package.json files from the root and defined workspace directories. Boundary markers: Absent. Capability inventory: subprocess.run operations in scripts/validate.py. Sanitization: Absent; the script parses JSON structure but does not sanitize the content of fields before processing or display.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
Audit Metadata