artifacts-builder

Warn

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The initialization script scripts/init-artifact.sh contains a potential command injection vulnerability where the user-supplied project name is directly interpolated into a sed command.\n
  • Evidence: The line $SED_INPLACE 's/<title>.*<\/title>/<title>'"$PROJECT_NAME"'<\/title>/' index.html allows for arbitrary shell command execution or file manipulation if the project name contains shell special characters or command delimiters.\n- [COMMAND_EXECUTION]: The skill relies on complex shell scripts to manage project setup, configuration, and bundling.\n
  • Evidence: Usage of init-artifact.sh and bundle-artifact.sh to automate file system operations, environment detection, and the execution of local binaries via pnpm exec.\n- [EXTERNAL_DOWNLOADS]: Both initialization and bundling scripts perform extensive downloads from the npm registry.\n
  • Evidence: The init-artifact.sh script attempts to install pnpm globally using npm install -g pnpm if it is not detected on the system, and installs a large set of React and shadcn/ui dependencies.\n- [EXTERNAL_DOWNLOADS]: The bundle-artifact.sh script dynamically installs build tools at runtime.\n
  • Evidence: Dynamic installation of parcel, @parcel/config-default, parcel-resolver-tspaths, and html-inline during the bundling process.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 1, 2026, 07:44 PM