Bun HTTP Server
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION] (HIGH): The static file server example in
SKILL.mdcontains a path traversal vulnerability. Evidence: The codeconst filePath =./public${url.pathname.replace("/static", "")};uses unsanitized user input fromurl.pathnameto construct a file system path. Risk: Attackers can use sequences like../to escape the./publicdirectory and read any file the process has permissions to access, such as.envfiles or SSH keys. - [PROMPT_INJECTION] (LOW): The skill demonstrates patterns that expose an indirect prompt injection surface. Ingestion points:
req.json(),req.formData(),req.headers, andreq.urlinSKILL.mdtake untrusted data from network requests. Boundary markers: Absent; no delimiters or warnings are used when processing request data. Capability inventory: The skill utilizesBun.filewhich provides file system read capabilities. Sanitization: Absent; the examples show direct processing of request properties without validation, escaping, or path normalization.
Recommendations
- AI detected serious security threats
Audit Metadata