bun-http-server

Pass

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [DATA_EXFILTRATION]: The implementation example for serving static files in SKILL.md is vulnerable to path traversal attacks. The code const filePath = ./public${url.pathname.replace("/static", "")}; allows an attacker to provide directory traversal sequences (such as ..) in the URL to access files outside the intended ./public directory.
  • [PROMPT_INJECTION]: The skill documents methods for ingesting and processing untrusted data from HTTP requests, creating a vulnerability surface for indirect prompt injection.
  • Ingestion points: The req.json(), req.formData(), and req.text() methods in SKILL.md are shown reading external data directly into the application context.
  • Boundary markers: Absent; the code snippets do not demonstrate the use of delimiters or instructions for the agent to ignore embedded commands within the processed data.
  • Capability inventory: The skill documentation leverages Bun.serve for server creation and Bun.file for file system interactions.
  • Sanitization: The examples do not include input validation, escaping, or sanitization logic for the data received from requests.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 3, 2026, 11:58 AM