vercel-deploy
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): The skill packages and uploads local project files to an external Vercel deployment endpoint.
- Evidence: In
scripts/deploy.sh, the commandtar -czf "$TARBALL" -C "$PROJECT_PATH" --exclude='node_modules' --exclude='.git' .followed bycurl -s -X POST "$DEPLOY_ENDPOINT" -F "file=@$TARBALL". - Risk: The exclusion list only covers
node_modulesand.git. Sensitive files commonly found in project roots, such as.env,.aws/credentials,.npmrc, or private keys, are included in the archive and sent to the remote server, potentially exposing secrets. - Privilege Escalation (LOW): The script modifies the user's filesystem without explicit confirmation or warning in the skill documentation.
- Evidence:
mv "$HTML_FILE" "$PROJECT_PATH/index.html"inscripts/deploy.sh. - Risk: For projects without a
package.json, the script automatically renames non-standard HTML files toindex.html. This is an unintended side effect that alters the user's project structure. - Indirect Prompt Injection (LOW): The skill presents a surface for indirect injection where malicious project metadata or file structures could trigger unintended behavior.
- Ingestion points:
package.jsoncontents and filesystem directory structure (scripts/deploy.sh). - Boundary markers: None provided; the script acts directly on the data it finds.
- Capability inventory: File system modification via
mvand network data exfiltration viacurlPOST. - Sanitization: No validation or sanitization of file contents or project paths is performed before processing.
Audit Metadata