task-specification-creator
Audited by Socket on Mar 16, 2026
1 alert found:
AnomalyNo direct evidence of deliberate malware in the provided fragment. However, the use of dynamically generated and executed scripts (written from plan/CLI inputs) introduces a significant code-injection risk if inputs are attacker-controllable or not properly escaped. Recommend: (1) Audit generatePlaywrightScript and all places that serialize user/plan data into executable code to ensure safe escaping (prefer structured serialization like JSON input files consumed by a static script instead of generating code), (2) avoid execSync of generated code where possible; run Playwright programmatically via an existing script module, passing data as JSON, (3) validate and sanitize filepaths and filenames, (4) run the Playwright execution in a sandboxed or least-privileged environment (CI container) and ensure tmp scripts are created with secure permissions and removed promptly, and (5) add explicit validation to prevent path traversal or dangerous characters in plan-supplied filenames.