bun
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Unverifiable Dependencies & Remote Code Execution] (CRITICAL): The automated scan confirmed a detection of a piped remote execution pattern:
curl -fsSL https://bun.sh/install | bash. - Evidence: Found in the automated security alerts section referencing the installation of the Bun runtime.
- Reasoning: This pattern allows a remote server (bun.sh) to execute arbitrary code on the local system with the user's current privileges. Because the domain 'bun.sh' (Oven) is not on the Trusted External Sources list, this is classified as CRITICAL.
- [Dynamic Execution] (HIGH): The skill provides extensive documentation for the Bun Shell (
$) API which allows for arbitrary command execution. - Evidence:
references/shell.mddetailes the use of$for running shell commands and capturing output. - Reasoning: While the documentation claims auto-escaping, the ability to spawn subprocesses and execute shell built-ins represents a high-risk privilege that can be exploited for system compromise.
- [Data Exposure & Exfiltration] (MEDIUM): The skill documentation includes instructions for connecting to PostgreSQL, MySQL, and S3, including the use of environment variables for credentials.
- Evidence:
references/database.mdandreferences/file-io.mddescribe connection strings and S3 client setups usingS3_ACCESS_KEY_IDandDATABASE_URL. - Reasoning: These APIs facilitate the reading and writing of sensitive data. In a compromised environment, these can be utilized for exfiltration.
- [Indirect Prompt Injection] (LOW): The skill possesses a significant attack surface where untrusted data could influence high-privilege tool calls.
- Ingestion points:
fetch()inreferences/networking.md,Bun.stdinandBun.file()inreferences/file-io.md. - Boundary markers: Absent in provided examples.
- Capability inventory:
Bun.sql,Bun.write(), and shell commands ($). - Sanitization: Documentation warns against
sql.unsafeandbash -c, but the surface remains vulnerable if the agent interpolates untrusted data into these calls.
Recommendations
- HIGH: Downloads and executes remote code from: https://bun.sh/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata