bug-predictor
Fail
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Command injection vulnerability in the git churn analysis logic. The
getChurnDatafunction inscripts/predict.tsconstructs a shell command using string interpolation of thesinceargument, which is a user-controlled parameter fromSKILL.md. An attacker can provide a crafted string containing shell metacharacters (e.g.,;,&&,|) to execute arbitrary system commands with the privileges of the agent process. Evidence:execSync(git log --since="${since}" --name-only --pretty=format: -- ., ...). - [COMMAND_EXECUTION]: Unvalidated arbitrary file write via the
outargument. Thepredictfunction inscripts/predict.tsusesfs.writeFileSyncto save the analysis report to a file path specified by the user. There is no path validation or sandboxing, allowing an attacker to overwrite sensitive system configuration or user files (e.g.,~/.bashrc,/etc/passwd). Evidence:fs.writeFileSync(options.outPath, JSON.stringify(report, null, 2)).
Recommendations
- AI detected serious security threats
Audit Metadata