web-artifacts-builder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill relies on executing local bash scripts
scripts/init-artifact.shandscripts/bundle-artifact.sh. Without the source code for these scripts, their behavior (such as file system modification or network calls) cannot be verified. - [EXTERNAL_DOWNLOADS] (MEDIUM): The bundling process explicitly installs multiple Node.js packages including
parcel,@parcel/config-default,parcel-resolver-tspaths, andhtml-inline. Installing unpinned or unverified packages at runtime introduces supply chain risks. - [INDIRECT_PROMPT_INJECTION] (HIGH): User-provided input (e.g.,
<project-name>) is passed directly as an argument tobash scripts/init-artifact.sh. This could be exploited via command injection if the script does not properly sanitize the input. - [DYNAMIC_EXECUTION] (MEDIUM): The skill uses Parcel to compile and bundle React/TypeScript code into a single HTML file at runtime, which is a form of dynamic code generation and execution within the agent's environment.
Recommendations
- AI detected serious security threats
Audit Metadata