artifact-management
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- CREDENTIALS_UNSAFE (LOW): Hardcoded dummy credentials detected in documentation.
- Evidence:
references/ARTIFACT_GUIDE.mdcontainsadmin:passin acurlexample for Nexus upload. - COMMAND_EXECUTION (MEDIUM): Shell script allows for potential command injection through unvalidated input.
- Evidence:
scripts/artifact_cleanup.shtakes user-provided arguments ($DAYS) and interpolates them directly into afindcommand. If an attacker provides a value like30; rm -rf /, the shell will execute the injected command after the find operation. - DATA_EXPOSURE (LOW): The
artifact_config.yamlfile exposes internal naming conventions and infrastructure addresses (e.g.,nexus.example.com). This is generally acceptable for templates but noted for environment awareness.
Audit Metadata