Geek-skills-security-audit
Warn
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill's primary functionality involves scanning the target project's filesystem for highly sensitive data, including AWS access keys, GitHub tokens, private keys, and database connection strings with embedded passwords. While the findings are saved to local reports, the systematic identification of these credentials represents a significant data exposure risk.\n- [COMMAND_EXECUTION]: The
scripts/full_scan.pyandscripts/dependency_check.pyscripts utilizesubprocess.run()to execute various system commands and security utilities such asnpm audit,pip-audit,safety, andbandit.\n- [EXTERNAL_DOWNLOADS]: The documentation directs the user to install and run external software. While several tools are well-known industry standards, the skill also promotes the installation of an unverified utility (fix-react2shell-next) to address specific vulnerabilities.\n- [REMOTE_CODE_EXECUTION]: The recommendation to usenpx fix-react2shell-nextinvolves downloading and executing code from a remote registry. This represents a potential remote code execution vector if the package source is not verified or if the package is malicious.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted file content without sanitization or boundary markers.\n - Ingestion points: The auditing scripts recursively read and process the content of every file in the target project directory through
scripts/full_scan.pyandscripts/secrets_scan.py.\n - Boundary markers: No boundary markers or 'ignore' instructions are used when processing the untrusted file content.\n
- Capability inventory: The skill possesses shell execution capabilities via
subprocess.run()and filesystem write permissions for report generation.\n - Sanitization: The skill does not perform sanitization of the scanned content, which is directly processed by regex engines and included in output reports.
Audit Metadata