Telos
Warn
Audited by Socket on Mar 5, 2026
1 alert found:
AnomalyAnomalyDashboardTemplate/App/api/upload/route.ts
LOWAnomalyLOW
DashboardTemplate/App/api/upload/route.ts
This handler implements basic extension checks and writes uploaded files into a directory under the server user's home. The code contains a significant security issue: it uses the client-supplied filename directly in path.join without sanitization or verification, enabling path traversal to create files outside the intended directory. It also logs resolved paths and filenames derived from client input. There is no evidence of malicious intent (no exfiltration, no eval, no process execution), but the insecure handling of filenames and lack of validation/authorization present a moderate-to-high security risk if the endpoint is accessible to untrusted clients.
Confidence: 90%Severity: 65%
Audit Metadata