file-archiver
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Path Traversal (Zip Slip) vulnerability. The
extract_archivefunction inscripts/file_archiver.py(lines 144 and 154) useszf.extractall()andtf.extractall()without validating archive member filenames. A malicious archive containing entries with../sequences can overwrite files outside the intended destination directory, potentially leading to unauthorized code execution by modifying system startup scripts (e.g., .bashrc) or SSH keys. - [EXTERNAL_DOWNLOADS] (LOW): The skill requires the
pyzipperpackage for encrypted ZIP support. While a standard library for this purpose, it introduces an external dependency that should be verified. - [METADATA_POISONING] (MEDIUM): The
source.repositoryfield inSKILL.mdpoints to the Python standard library documentation instead of the actual source code repository for the skill, which is misleading. - [INDIRECT_PROMPT_INJECTION] (HIGH): Mandatory Evidence Chain: 1. Ingestion points:
scripts/file_archiver.py(lines 144, 154) viaextractall(). 2. Boundary markers: Absent. 3. Capability inventory: File write access viaextractall(). 4. Sanitization: Absent. No validation of archive member paths against the target extraction directory.
Recommendations
- AI detected serious security threats
Audit Metadata