art-repo-upload
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill requires a service account key file named
ace-art-repo-secret.jsonto be present in the project root. Hardcoding or requiring sensitive credential files in predictable locations increases the risk of accidental exposure or theft. - [DATA_EXFILTRATION]: The script reads files from the
downloads/directory and uploads them to an external Google Drive folder (ID:1TVKblJrcQii4YHYMMons2bBokyGiClsH). While intended for art backups, this mechanism could be repurposed to exfiltrate any file placed in the monitored directories to an attacker-controlled Drive account. - [COMMAND_EXECUTION]: The documentation suggests executing the skill using
pnpm exec tsxornode --import tsx/esm, which involves dynamic execution of TypeScript/JavaScript code. If theupload.tsfile or its dependencies are tampered with, it could lead to arbitrary code execution on the host system.
Audit Metadata