vendure-plugin-reviewing
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Dynamic Execution (HIGH): Vulnerable shell command construction using
xargsandsh -c.\n - Evidence: The automated check command:
grep -rn "onApplicationBootstrap" --include="*plugin.ts" | xargs -I{} sh -c 'grep -L "onApplicationShutdown" {} 2>/dev/null'in SKILL.md.\n - Description: The placeholder
{}is replaced by the output ofgrep -rn, which includes file paths and the content of matching lines. If a file path or the content contains single quotes or shell metacharacters (e.g.,;,$(), or`), it can break out of thesh -ccommand string and execute arbitrary commands on the host system. This is a classic command injection vector when processing untrusted code.\n- Indirect Prompt Injection (LOW): The skill is designed to ingest and process untrusted external data (source code).\n - Ingestion points: Uses
findandgrepto read and display content from all.ts,.service.ts, and.entity.tsfiles discovered in the working directory.\n - Boundary markers: Absent; the skill does not use delimiters or clear instructions to the agent to ignore embedded instructions within the source code files it processes.\n
- Capability inventory: Limited to local read-only shell utilities (
find,grep,xargs). No file-write, network exfiltration, or persistence capabilities were identified in the skill scripts.\n - Sanitization: None; the skill performs raw text searching on file contents without any validation, filtering, or escaping of the ingested data.
Recommendations
- AI detected serious security threats
Audit Metadata