test-genie
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
child_process.execinsrc/lib.tsto perform test runs. This function invokes a system shell, which is inherently risky if the command string contains unsanitized input. - [COMMAND_EXECUTION]: The
customCommandargument from the command line (process.argv[3]) is passed directly to the shell without any filtering or sanitization insrc/index.ts, permitting arbitrary command injection. - [REMOTE_CODE_EXECUTION]: The logic in
src/lib.tsautomatically extracts and executes command strings from a project'spackage.jsonfile. An attacker can craft a malicious repository with dangerous code in the test script field to achieve code execution when the agent analyzes the repo. - [DATA_EXFILTRATION]: The skill returns the full output of the executed commands. A malicious command could be used to read local sensitive files like
~/.ssh/id_rsaor.env, and the contents would be returned in the skill's response.
Recommendations
- AI detected serious security threats
Audit Metadata