security-scan
Warn
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/scan.mjsheavily relies onexecSyncto run shell utilities likefind,grep, andcatto perform its scanning logic. - [REMOTE_CODE_EXECUTION]: Multiple functions in
scripts/scan.mjsare vulnerable to command injection because they interpolate data from the codebase being scanned directly into shell command strings without sanitization. - In the
scanSecretsfunction, the script executescat "${f}"wherefis a filename returned byfind. A file with a name like$(touch pwned).jswould trigger arbitrary command execution. - In the
scanNpmAuditfunction, the script usescd "${absDir}", which is vulnerable if the directory path contains shell metacharacters. - In the
scanDependenciesfunction, the script runsnpm view "${name}@${version}"using package names and versions parsed directly from apackage.jsonfile, allowing for injection via malicious package metadata. - [SAFE]: The skill recommends and integrates with well-known security tools such as Semgrep, Trivy, and Gitleaks.
- [SAFE]: The use of official package registries via
npm auditandnpm viewfor dependency analysis is consistent with the skill's intended security purpose.
Audit Metadata