gitnexus-explorer
Fail
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The
proxy.mjsscript contains a directory traversal vulnerability in theserveStaticfunction. The script joins the user-providedreq.urlwith a local directory path without any sanitization or validation. An attacker can use..sequences to escape the intended directory and read sensitive files from the host system (e.g.,GET /../../../../etc/passwd). - [DATA_EXFILTRATION]: The skill utilizes
cloudflaredto expose a local web service to the public internet. This creates a public entry point that can be exploited to access the vulnerable proxy script and the indexed codebase data without authentication. - [REMOTE_CODE_EXECUTION]: The skill clones the
GitNexusrepository from a third-party GitHub account and executesnpm installandnpm run build. This pattern involves running arbitrary code from an external source during the setup phase. - [EXTERNAL_DOWNLOADS]: The skill downloads the
cloudflaredbinary from its official GitHub repository. While the source is a well-known service, the skill subsequently executes the binary locally. - [COMMAND_EXECUTION]: The skill uses
chmod +xto grant execution permissions to downloaded binaries and executes shell commands to modify the cloned web application's configuration files.
Recommendations
- AI detected serious security threats
Audit Metadata