bun-nuxt
Warn
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The code snippet in
server/api/files/[name].tsis vulnerable to Path Traversal. It usesgetRouterParam(event, 'name')to directly construct a file path (./data/${name}) without sanitization. An attacker could provide a value like../../.envor../../../../etc/passwdto read sensitive files from the server environment. - [PROMPT_INJECTION]: The skill defines several ingestion points for untrusted data that are processed by the agent without sufficient safety boundaries or sanitization logic. * Ingestion points: Untrusted data enters via
getRouterParaminserver/api/files/[name].tsandreadBody/getQueryinserver/api/users.post.ts. * Boundary markers: No delimiters or instructions are provided to the agent to treat this data as untrusted or to ignore embedded control sequences. * Capability inventory: The skill utilizes sensitive capabilities including filesystem reading (Bun.file().text()) and SQLite database operations (db.query,db.run). * Sanitization: The provided templates lack input validation, path normalization, or SQL parameterization examples in all routes, creating a significant attack surface for indirect prompt injection or data poisoning.
Audit Metadata