skills/mgdaaslab/wharttest/whart-test/Gen Agent Trust Hub

whart-test

Fail

Audited by Gen Agent Trust Hub on Mar 11, 2026

Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: A hardcoded default API key wharttest-default-mcp-key-2025 is present in whart_tools.py, which could lead to unauthorized access if the backend is exposed.
  • [DATA_EXFILTRATION]: The upload_screenshot and upload_screenshots functions in whart_tools.py accept file paths directly from arguments. Because the script only prepends SCREENSHOT_DIR if no directory separators are present, an attacker can provide absolute paths or use directory traversal (e.g., ../../etc/passwd) to read and upload sensitive local files to the backend server.
  • [COMMAND_EXECUTION]: The script uses the open() function on unvalidated user-supplied file paths, facilitating arbitrary file access through the agent's file system capabilities.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 11, 2026, 02:24 PM