create-psr6-cache
Fail
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The generated code for both
RedisCachePoolandFileCachePoolinreferences/templates.mdutilizes the PHPunserialize()function to process data retrieved from the cache storage. This is a well-known vulnerability surface for PHP Object Injection, which can allow an attacker who gains access to the underlying storage (Redis or the local file system) to execute arbitrary code within the context of the application.\n- [COMMAND_EXECUTION]: TheFileCachePoolimplementation inreferences/templates.mdincludes logic in its constructor to create a cache directory usingmkdir($directory, 0777, true). Setting permissions to0777makes the directory world-writable, which is a significant security risk on multi-user systems as it allows any user to modify or delete the cached data, potentially leading to privilege escalation or data tampering.
Recommendations
- AI detected serious security threats
Audit Metadata