artifacts-builder
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The
scripts/init-artifact.shscript installs over 50 Node.js packages from the NPM registry and utilizespnpm create viteto fetch and execute remote scaffolding code at runtime. - [REMOTE_CODE_EXECUTION] (MEDIUM): The
scripts/bundle-artifact.shscript dynamically installsparcelandhtml-inlineand immediately executes them viapnpm execto bundle the project. - [COMMAND_EXECUTION] (MEDIUM): In
scripts/init-artifact.sh, the user-provided$PROJECT_NAMEvariable is directly interpolated into asedcommand:$SED_INPLACE 's/<title>.*<\/title>/<title> '"$PROJECT_NAME"' <\/title>/' index.html. If the project name contains characters like/or shell metacharacters, it can lead to command failure or unexpected code execution. - [COMMAND_EXECUTION] (LOW): The initialization script attempts a global installation of
pnpm(npm install -g pnpm) if the command is not found on the path, which may exceed intended permission boundaries in some environments. - [REMOTE_CODE_EXECUTION] (MEDIUM): The script
scripts/init-artifact.shextracts a local archiveshadcn-components.tar.gz. Since the contents of this archive are not provided for analysis, it represents an opaque execution surface that could contain malicious scripts or components.
Audit Metadata