writing-latex
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The documentation file
references/DOCUMENT-CLASSES.mdincludes an example bash script that uses thechmod 777command. This is an insecure permission setting that grants all users full access to read, write, and execute the file, representing a privilege escalation risk. - [REMOTE_CODE_EXECUTION]: The files
INSTRUCTIONS.mdandreferences/REFERENCE.mdrecommend compiling LaTeX files with the-shell-escapeflag. This configuration is highly dangerous as it enables the TeX engine to execute arbitrary external shell commands, which could be leveraged by a malicious document to compromise the host system. - [COMMAND_EXECUTION]: Multiple reference files, such as
references/PLOTTING-COMPUTATION.mdandreferences/SCIENCE-PACKAGES.md, describe the use ofluacodeand\directlua. These features allow for the execution of Lua scripts during the typesetting process, which can interact with the underlying operating system and perform unauthorized actions.
Recommendations
- AI detected serious security threats
Audit Metadata