bump-deps
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Command injection vulnerability in the
scripts/run-taze.shscript. - The script accepts user-provided package names via the
--includeargument, which are stored in the$includevariable. - The variable is used to construct
$include_flagand then expanded without quotes in the final execution line:taze major $recursive $include_flag --include-locked. - The script explicitly disables shell linting (
# shellcheck disable=SC2086) for this line to allow word splitting, which enables an attacker to inject arbitrary shell commands using metacharacters (e.g.,;,&,|, or backticks) within the package name arguments. - [EXTERNAL_DOWNLOADS]: Reliance on unverified external CLI tools.
- The skill requires the installation and execution of
tazeandniCLI tools. SKILL.mdprovides instructions for the global installation of these tools from the NPM registry (npm install -g taze).- These dependencies are downloaded and executed at runtime, introducing a supply chain risk if the packages are compromised or if typosquatting occurs.
Recommendations
- AI detected serious security threats
Audit Metadata