web-artifacts-builder
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/init-artifact.shscript performs multiple system operations including file extraction withtarand environment setup. It also attempts to installpnpmglobally vianpm install -g pnpmif it is not present. - [COMMAND_EXECUTION]: The
scripts/init-artifact.shscript usessedto update the<title>tag inindex.htmlusing the user-supplied project name. This input is not sanitized, which can lead to shell command failure or the injection of unintended content into the generated HTML files. - [EXTERNAL_DOWNLOADS]: The skill installs a large number of packages from the NPM registry, such as
vite,tailwindcss,parcel, and various@radix-uilibraries. These are established tools in the web development ecosystem. - [REMOTE_CODE_EXECUTION]: The project initialization relies on
pnpm create vite, which fetches and executes scaffolding code from the NPM registry. - [COMMAND_EXECUTION]: The initialization script uses
node -eto dynamically modifytsconfig.jsonandtsconfig.app.jsonby executing inline JavaScript code. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection via the project name parameter.
- Ingestion points: The project name enters the system as a command-line argument in
scripts/init-artifact.sh. - Boundary markers: No boundary markers or 'ignore' instructions are used to separate the project name from the shell command logic.
- Capability inventory: The script has the ability to run shell commands (
sed,pnpm,tar), modify files, and install global packages. - Sanitization: No validation or sanitization is performed on the project name before it is interpolated into shell commands.
Audit Metadata