encrypt-decrypt-backup
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/decrypt.tsandscripts/encrypt.tsusenode:child_process.execto run thebbackupCLI. The command strings are constructed using template literals that interpolate user-provided arguments likeinputPath,password, andoutputPath. Because these values are not properly sanitized or escaped, an attacker can provide inputs containing shell metacharacters (e.g.,;,&,|) to execute arbitrary commands on the host system. - Ingestion points: Command-line arguments in
scripts/decrypt.tsandscripts/encrypt.ts. - Capability inventory:
execAsyncsubprocess calls in both scripts. - Sanitization: No sanitization or escaping of shell metacharacters is performed before interpolation.
- [CREDENTIALS_UNSAFE]: Both
encrypt.tsanddecrypt.tspass the user's password directly as a command-line argument to thebbackuptool (e.g.,-p "${password}"). On most operating systems, command-line arguments of running processes are visible to all users via process monitoring tools likepsortop. This exposes sensitive backup passphrases to other users or malicious processes on the same system.
Recommendations
- AI detected serious security threats
Audit Metadata