create-psr16-simple-cache
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
RedisCachetemplate inSKILL.mdand theFileCachetemplate inreferences/templates.mdutilize theunserialize()function on data retrieved from external sources like Redis and the local filesystem. Deserializing data from these sources is insecure as it allows for PHP Object Injection, which can lead to Remote Code Execution if an attacker can manipulate the stored data.\n- [COMMAND_EXECUTION]: TheFileCacheimplementation inreferences/templates.mdusesmkdir()with0777permissions. This results in the creation of world-writable directories, which is a security risk in shared environments as it allows any local user to read, modify, or delete the cache files.
Recommendations
- AI detected serious security threats
Audit Metadata