pre-merge-checklist
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): Python code injection vulnerability in
scripts/accessibility-check.sh. - Evidence: The script executes a Python snippet via
python3 -cthat uses shell string interpolation:json.load(open('${PAGE_JSON}')). - Context: The variable
${PAGE_JSON}is constructed using the user-supplied--output-dirargument. A maliciously crafted directory name (e.g., containing single quotes and Python commands) can break out of theopen()call and execute arbitrary Python code. - [EXTERNAL_DOWNLOADS] (LOW): Usage of
npxfor dynamic package execution. - Evidence: The scripts frequently invoke
npx @axe-core/cli,npx playwright,npx eslint, andnpx tsc. - Context:
npxdownloads and executes code from the npm registry at runtime if the package is not already cached or installed. While used for legitimate dev tools, it introduces a dependency on external, mutable code sources. - [COMMAND_EXECUTION] (LOW): Use of
evalin the orchestration script. - Evidence: In
scripts/run-all-checks.sh, therun_checkfunction useseval "$cmd"to execute the check logic. - Context: While the commands passed to
evalare currently hardcoded within the script, the use ofevalis a dangerous practice that can be exploited if the script logic is modified to include untrusted inputs.
Audit Metadata