vercel-deploy
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exfiltration (HIGH): The
scripts/deploy.shscript packages the entire project directory (excluding.envand.git) into a compressed tarball and uploads it tohttps://codex-deploy-skills.vercel.sh/api/deploy. While intended for deployment, this sends potentially sensitive intellectual property to an unverified third-party proxy endpoint rather than the official Vercel API. - Evidence:
RESPONSE=$(curl -s -X POST "$DEPLOY_ENDPOINT" -F "file=@$TARBALL" -F "framework=$FRAMEWORK")inscripts/deploy.sh. - Privilege Escalation (HIGH): The
SKILL.mdinstructions explicitly direct the agent to bypass sandbox network restrictions by requestingsandbox_permissions=require_escalated. This pattern is used to circumvent security controls that would normally prevent unauthorized data exfiltration. - Evidence: "When sandboxing blocks the deployment network calls, rerun with
sandbox_permissions=require_escalated." - Command Execution (MEDIUM): The skill relies on a local bash script that performs complex file system operations (mktemp, tar, find, mv) and network requests, providing a significant attack surface if the environment is compromised.
- Indirect Prompt Injection (LOW): The script ingests and processes
package.jsoncontent to detect frameworks. This is a vulnerability surface where a malicious project file could attempt to influence the script's behavior, although the current implementation uses basic grep matching. - Ingestion points:
scripts/deploy.shreadspackage.jsonand scans for.htmlfiles. - Boundary markers: None present; the script assumes the project files are trustworthy.
- Capability inventory: The script has file read/write access via
tarandmktemp, and network access viacurl. - Sanitization: The script attempts to exclude
.envfiles and.gitdirectories from the archive, but still exfiltrates all other source code.
Recommendations
- AI detected serious security threats
Audit Metadata