The skill executes arbitrary remote content from mutable, unauthenticated
Claims to do
Web Interface Guidelines: Review files for compliance with Web Interface Guidelines.
Actually does
The skill uses `WebFetch` to retrieve web interface guidelines from `https://raw.githubusercontent.com/vercel-labs/web-interface-guidelines/main/command.md`. It then reads specified local files or patterns, applies the fetched guidelines as rules to these files, and outputs findings in a `file:line` format.
The skill instructs the agent to fetch content from an external GitHub URL and then execute that content as rules and 'output format instructions'. This is a classic indirect prompt injection vector: an attacker who controls or compromises the remote repository can inject arbitrary instructions into the agent's reasoning pipeline. The fetched content is explicitly trusted to define behavior ('The fetched content contains all the rules and output format instructions'), meaning a malicious payload at that URL would be executed with full agent privileges.
Fetch fresh guidelines before each review: ``` https://raw.githubusercontent.com/vercel-labs/web-interface-guidelines/main/command.md ``` Use WebFetch to retrieve the latest rules. The fetched content contains all the rules and output format instructions.
The skill fetches guidelines from a mutable GitHub raw URL pointing to the `main` branch with no pinned commit hash or content integrity check. This means any future push to that repository's main branch immediately changes the instructions the agent executes. An attacker who gains write access to the repository (or performs a repo takeover if the org/repo is abandoned) can silently alter the agent's behavior for all users of this skill.
https://raw.githubusercontent.com/vercel-labs/web-interface-guidelines/main/command.md
The skill's declared purpose (UI code review for accessibility and design guidelines) does not align with its actual runtime behavior (fetching and executing arbitrary remote content as agent instructions). A user invoking this skill for a benign review task would be unaware that the agent is fetching and acting on externally-controlled instructions. This mismatch conceals the true attack surface from both users and automated skill auditors.
description: Review UI code for Web Interface Guidelines compliance. Use when asked to "review my UI", "check accessibility", "audit design"... [vs] The fetched content contains all the rules and output format instructions.
The skill fetches its core 'rules' and 'output format instructions' from an external, unauthenticated URL. A compromise of this external resource could allow an attacker to inject malicious instructions, effectively poisoning the agent's knowledge base and controlling its behavior.
https://raw.githubusercontent.com/vercel-labs/web-interface-guidelines/main/command.md The fetched content contains all the rules and output format instructions.
The skill reads user-specified files and applies rules from an externally controlled source. If these guidelines are compromised, an attacker could craft instructions to exfiltrate the content of the read files.
Read the specified files Apply all rules from the fetched guidelines Output findings using the format specified in the guidelines.
The skill instructs the agent to use a WebFetch tool to retrieve content from an attacker-controllable URL. If the remote content is ever modified to include redirect instructions or alternative URLs (e.g., pointing to internal network resources), the agent's WebFetch capability could be abused as an SSRF vector to probe internal infrastructure accessible from the agent's execution environment.
Use WebFetch to retrieve the latest rules.
The skill mandates the agent fetch external content before every review ('Fetch fresh guidelines before each review') without any user confirmation or opportunity to inspect what is being fetched and executed. This pattern removes human oversight from a critical trust boundary — the agent autonomously loads and acts on externally-sourced instructions every time the skill is triggered.
Fetch fresh guidelines before each review: 1. Fetch guidelines from the source URL above 2. Read the specified files 3. Apply all rules from the fetched guidelines 4. Output findings using the format specified in the guidelines
[](https://mondoo.com/ai-agent-security/skills/github/vercel-labs/agent-skills/web-design-guidelines)<a href="https://mondoo.com/ai-agent-security/skills/github/vercel-labs/agent-skills/web-design-guidelines"><img src="https://mondoo.com/ai-agent-security/api/badge/github/vercel-labs/agent-skills/web-design-guidelines.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/vercel-labs/agent-skills/web-design-guidelines.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.