Bun SvelteKit

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • DATA_EXFILTRATION (HIGH): Path Traversal vulnerability in 'src/routes/api/files/[name]/+server.ts'. The 'GET' and 'PUT' handlers use the 'name' parameter directly in 'Bun.file' and 'Bun.write' without any validation or sanitization. This allows an attacker to access or modify any file the Bun process can reach, such as using '../../.env' to steal secrets or '../../etc/passwd' to read system configurations.
  • EXTERNAL_DOWNLOADS (MEDIUM): The skill instructs users to download and execute code from npm, including 'svelte-adapter-bun' and via 'bunx'. These dependencies do not originate from the defined Trusted External Sources, posing a supply chain risk.
  • COMMAND_EXECUTION (LOW): The skill contains multiple shell commands for project setup and deployment (e.g., 'bun install', 'bun run build'). While standard for development, they execute in the local environment and should be audited.
  • PROMPT_INJECTION (LOW): The skill contains an Indirect Prompt Injection surface. It ingests untrusted data (filenames and file content) and processes it via high-privilege file system APIs without using boundary markers, sanitization, or explicit warnings to the agent about the nature of the data.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:09 PM