acc-create-psr6-cache
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): Unsafe Deserialization in PHP Templates. Found in
references/templates.md. TheRedisCachePool::getItemandFileCachePool::getItemmethods use the PHPunserialize()function on data retrieved from external storage (Redis and local files) without validation. An attacker who can control the storage content can trigger PHP Object Injection, leading to arbitrary code execution. - [COMMAND_EXECUTION] (MEDIUM): Insecure File Permissions. Found in
references/templates.md. TheFileCachePoolconstructor usesmkdir($directory, 0777, true), which creates world-writable directories. This is a security risk on multi-user systems and exacerbates the risk of cache tampering.
Recommendations
- AI detected serious security threats
Audit Metadata