Directus Backend Architecture
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): SQL Injection in
/analytics/:collection. Thegroup_byvariable, sourced directly fromreq.query, is interpolated into adatabase.raw()call without any sanitization or validation against a whitelist. Evidence:database.raw(\DATE_TRUNC('${group_by}', created_at) as period`)inexamples/custom-endpoint.ts. \n- **DATA_EXFILTRATION (HIGH):** Authentication Bypass in/send-notification. Unlike the/batch-processendpoint, this route does not verifyreq.accountability?.user, allowing unauthenticated actors to send emails through the server'sMailService. \n- **DATA_EXFILTRATION (MEDIUM):** HTML Injection in/send-notification. User-provided data fromreq.body.datais interpolated directly into HTML templates (e.g.,welcome,alert,report) without escaping or sanitization. This can be used to perform phishing or stored XSS attacks against email recipients. \n- **DATA_EXFILTRATION (LOW):** Information Disclosure in/health. The endpoint returns detailed environment metrics includingprocess.memoryUsage()andprocess.uptime()`, which can be used for host footprinting.
Recommendations
- AI detected serious security threats
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata