web-artifacts-builder
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/init-artifact.shattempts to install thepnpmpackage manager globally usingnpm install -g pnpmif it is not already present, which modifies the system-wide environment. - [COMMAND_EXECUTION]: The project initialization script
scripts/init-artifact.shis vulnerable to command injection because it interpolates the user-provided project name directly into shell commands andsedexpressions without sanitization or quoting. - Ingestion point: Project name argument in
scripts/init-artifact.sh. - Boundary markers: None provided to delimit the input from the command logic.
- Capability inventory: Script executes
pnpm,sed,tar, andnodecommands. - Sanitization: No validation or escaping is applied to the input variable.
- [COMMAND_EXECUTION]: The skill uses
node -eto programmatically edit configuration files (tsconfig.jsonandtsconfig.app.json) by executing inline JavaScript code during project setup. - [EXTERNAL_DOWNLOADS]: The skill's scripts download and install a large number of third-party packages from the NPM registry, creating a significant dependency footprint including Vite, Parcel, and various UI component libraries.
- [SAFE]: Documentation in
references/artifact-patterns.mdincludes links to trusted CDNs such asunpkg.comfor standard frontend libraries, which is consistent with normal development practices.
Audit Metadata