edgeone-pages-dev

Fail

Audited by Gen Agent Trust Hub on May 11, 2026

Risk Level: CRITICALEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Automated security scanners detected 18 malicious URLs within the skill's documentation, primarily subdomains of 'edgeone.site' (e.g., python-handler-template.edgeone.site). These subdomains are used as previews for project templates and are flagged for phishing and as blacklisted sites.
  • [REMOTE_CODE_EXECUTION]: The skill directs users to download and execute serverless function templates from several external GitHub repositories (github.com/TencentEdgeOne/*). Due to the association with flagged preview domains, there is a risk that the source code in these templates is compromised or malicious.
  • [COMMAND_EXECUTION]: Instructions guide the user to install the 'edgeone' CLI globally and run it with local environment variables. This provides a mechanism for the vendor's code to execute with user-level privileges on the host system.
  • [EXTERNAL_DOWNLOADS]: The domains 'edgeone.site' and 'edgeone.run' used for project previews are not among the verified vendor domains specified in the security context, which increases the likelihood of typosquatting or impersonation attacks.
  • [EXTERNAL_DOWNLOADS]: Antivirus scanners flagged several documentation files (python-functions.md, node-functions.md, go-functions.md) for containing suspicious HTTP request patterns. While these patterns may be related to standard web framework boilerplate code, they add to the overall security risk identified by other scanners.
Recommendations
  • CRITICAL: 3 infected file(s) detected - DO NOT USE
  • AI detected serious security threats
  • Contains 18 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
May 11, 2026, 01:35 PM