gitnexus-explorer

Fail

Audited by Gen Agent Trust Hub on Apr 15, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
  • [DATA_EXFILTRATION]: The proxy.mjs script contains a directory traversal vulnerability in the serveStatic function. The script joins the user-provided req.url with a local directory path without any sanitization or validation. An attacker can use .. sequences to escape the intended directory and read sensitive files from the host system (e.g., GET /../../../../etc/passwd).
  • [DATA_EXFILTRATION]: The skill utilizes cloudflared to expose a local web service to the public internet. This creates a public entry point that can be exploited to access the vulnerable proxy script and the indexed codebase data without authentication.
  • [REMOTE_CODE_EXECUTION]: The skill clones the GitNexus repository from a third-party GitHub account and executes npm install and npm run build. This pattern involves running arbitrary code from an external source during the setup phase.
  • [EXTERNAL_DOWNLOADS]: The skill downloads the cloudflared binary from its official GitHub repository. While the source is a well-known service, the skill subsequently executes the binary locally.
  • [COMMAND_EXECUTION]: The skill uses chmod +x to grant execution permissions to downloaded binaries and executes shell commands to modify the cloned web application's configuration files.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 15, 2026, 05:05 AM