baoyu-format-markdown
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
applyAutocorrectfunction inscripts/autocorrect.tsexecutes a shell command usingexecSyncwith thefilePathvariable directly interpolated. A malicious file path containing shell metacharacters like semicolons or backticks can trigger arbitrary command execution. Evidence found inautocorrect.ts. - EXTERNAL_DOWNLOADS (HIGH): The skill uses
npxinscripts/autocorrect.tsto executeautocorrect-node. This results in downloading and executing unverified code from the npm registry at runtime without integrity verification. - REMOTE_CODE_EXECUTION (HIGH): The combination of shell injection in
filePathand the use ofexecSyncprovides a direct path for remote code execution on the system running the agent.
Recommendations
- AI detected serious security threats
Audit Metadata