whart-test
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: A hardcoded default API key
wharttest-default-mcp-key-2025is present inwhart_tools.py, which could lead to unauthorized access if the backend is exposed. - [DATA_EXFILTRATION]: The
upload_screenshotandupload_screenshotsfunctions inwhart_tools.pyaccept file paths directly from arguments. Because the script only prependsSCREENSHOT_DIRif no directory separators are present, an attacker can provide absolute paths or use directory traversal (e.g.,../../etc/passwd) to read and upload sensitive local files to the backend server. - [COMMAND_EXECUTION]: The script uses the
open()function on unvalidated user-supplied file paths, facilitating arbitrary file access through the agent's file system capabilities.
Recommendations
- AI detected serious security threats
Audit Metadata