hyperstack-build
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches the official Rust toolchain from sh.rustup.rs and win.rustup.rs, and installs the vendor-provided CLI tool.
- [REMOTE_CODE_EXECUTION]: Initial environment setup involves executing a shell script piped from a remote URL (curl | sh) and running downloaded binaries from official Rust project sources.
- [COMMAND_EXECUTION]: The skill performs dynamic code generation and compilation using 'cargo build' and installs the 'hyperstack-cli' utility from the vendor.
- [PROMPT_INJECTION]: An indirect prompt injection surface is identified in the URL resolver functionality, which can fetch data from arbitrary HTTP endpoints defined in on-chain IDLs; there are no boundary markers or explicit sanitization steps for this untrusted external data ingestion.
Recommendations
- HIGH: Downloads and executes remote code from: https://sh.rustup.rs - DO NOT USE without thorough review
Audit Metadata