desktop-apps
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- DATA_EXFILTRATION (HIGH): The IPC handlers
fs:readandfs:writeintemplates/electron-main.ts(lines 228-236) accept arbitrary file paths from the renderer process without any validation or sanitization. This allows a compromised renderer to bypass the sandbox and read or modify sensitive host files (e.g., SSH keys, credentials). - EXTERNAL_DOWNLOADS (HIGH): An automated scanner (URLite) identified a blacklisted URL in the
main.rsfile (Alert: URL:Blacklist|UR09BDF6D942948297-0200|urlb). This indicates the presence of references to known malicious infrastructure within the Tauri source component. - COMMAND_EXECUTION (MEDIUM): The
electron-main.tstemplate exposes theautoUpdater.quitAndInstall()function to the renderer process via theupdate:installIPC channel. This allows an attacker who gains control of the renderer to force application updates, which could be leveraged if the update server is also compromised.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata