senior-frontend

Fail

Audited by Gen Agent Trust Hub on Feb 14, 2026

Risk Level: HIGHPROMPT_INJECTION
Full Analysis
  • Indirect Prompt Injection (HIGH): The component generator script exposes a significant attack surface by taking user-controlled input and performing file system operations without sanitization.
  • Ingestion points: The name and --dir arguments in scripts/component_generator.py are intended to be populated by the agent based on user requests.
  • Boundary markers: None. There are no delimiters or instructions to the agent to treat these inputs as literal or restricted.
  • Capability inventory: The script uses pathlib.Path.mkdir(parents=True) and Path.write_text() to create directories and write files to the disk.
  • Sanitization: None. The script does not use any path validation or 'realpath' checks to ensure that the generated files remain within a designated workspace. A malicious user could provide a component name like ../../../../tmp/malicious to write files outside of the project root.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 14, 2026, 04:45 PM