NYC

file-archiver

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION] (HIGH): Path Traversal (Zip Slip) vulnerability. The extract_archive function in scripts/file_archiver.py (lines 144 and 154) uses zf.extractall() and tf.extractall() without validating archive member filenames. A malicious archive containing entries with ../ sequences can overwrite files outside the intended destination directory, potentially leading to unauthorized code execution by modifying system startup scripts (e.g., .bashrc) or SSH keys.
  • [EXTERNAL_DOWNLOADS] (LOW): The skill requires the pyzipper package for encrypted ZIP support. While a standard library for this purpose, it introduces an external dependency that should be verified.
  • [METADATA_POISONING] (MEDIUM): The source.repository field in SKILL.md points to the Python standard library documentation instead of the actual source code repository for the skill, which is misleading.
  • [INDIRECT_PROMPT_INJECTION] (HIGH): Mandatory Evidence Chain: 1. Ingestion points: scripts/file_archiver.py (lines 144, 154) via extractall(). 2. Boundary markers: Absent. 3. Capability inventory: File write access via extractall(). 4. Sanitization: Absent. No validation of archive member paths against the target extraction directory.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 05:17 AM