task-specification-creator

Warn

Audited by Socket on Mar 16, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/capture-screenshots.js

No direct evidence of deliberate malware in the provided fragment. However, the use of dynamically generated and executed scripts (written from plan/CLI inputs) introduces a significant code-injection risk if inputs are attacker-controllable or not properly escaped. Recommend: (1) Audit generatePlaywrightScript and all places that serialize user/plan data into executable code to ensure safe escaping (prefer structured serialization like JSON input files consumed by a static script instead of generating code), (2) avoid execSync of generated code where possible; run Playwright programmatically via an existing script module, passing data as JSON, (3) validate and sanitize filepaths and filenames, (4) run the Playwright execution in a sandboxed or least-privileged environment (CI container) and ensure tmp scripts are created with secure permissions and removed promptly, and (5) add explicit validation to prevent path traversal or dangerous characters in plan-supplied filenames.

Confidence: 75%Severity: 62%
Audit Metadata
Analyzed At
Mar 16, 2026, 04:51 AM
Package URL
pkg:socket/skills-sh/daishiman%2Faiworkfloworchestrator%2Ftask-specification-creator%2F@ead29017aa0146b654ae8841ab4b41a7689fcaf5