jenkinsfile-generator
Fail
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The
resolve_k8s_yamlfunction withinscripts/generate_declarative.pyallows for arbitrary file read operations. It takes the value provided to the--k8s-yamlargument and checks if it exists as a file on the local filesystem usingpathlib.Path.is_file(). If a file is found, the script usesread_text()to extract the entire content and embeds it into the generated Jenkinsfile. Because the script employs.expanduser(), it facilitates easy access to sensitive files in the home directory, such as~/.ssh/id_rsa,~/.aws/credentials, or.envfiles. This enables a user to harvest sensitive configuration or identity data from the agent's environment by including it in the generated pipeline code. - [COMMAND_EXECUTION]: The skill operates by executing local Python scripts (
scripts/generate_declarative.py,scripts/generate_scripted.py, andscripts/generate_shared_library.py) that process user input to generate executable Groovy code. While the skill uses some escaping mechanisms for string literals to prevent injection into the generated Groovy syntax, the capability to read local files significantly expands the attack surface.
Recommendations
- AI detected serious security threats
Audit Metadata