kb-view
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: The server started by
scripts/serve.pyincludes anAccess-Control-Allow-Origin: *header. This configuration allows any website visited by the user to interact with the local API (127.0.0.1:8787), potentially exposing sensitive knowledge base contents, configuration files, and search results to external attackers through cross-origin requests.- [COMMAND_EXECUTION]: The_serve_treefunction inscripts/serve.pyusessubprocess.runto execute a script namedkb_loader.py. The location of this script is determined at runtime by searching through the project directory, which could allow for the execution of arbitrary code if a malicious file with that name is present in askill/scriptsdirectory within the user's workspace.- [EXTERNAL_DOWNLOADS]: Thescripts/index.htmlfile fetches several JavaScript and CSS libraries (marked.js, highlight.js, d3.js, and mermaid.js) fromcdn.jsdelivr.net. These are well-known services used for standard document rendering and visualization functionality, and are considered safe under the trusted scope rules.
Audit Metadata