invoice-generator
Warn
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
generate.shscript executes several system commands includingnode,jq, andweasyprintto process data and generate PDF output. - [DATA_EXFILTRATION]: The script allows the reading of arbitrary local files if a path is provided as the first argument to the generation command. Additionally, because the tool uses
weasyprintto render HTML into a PDF, it is potentially vulnerable to Local File Inclusion (LFI). If the input JSON data contains malicious HTML tags (such as<link>or<img>tags referencingfile://URIs), the resulting PDF could contain sensitive local file contents. - [REMOTE_CODE_EXECUTION]: The skill uses a shell 'heredoc' to pipe a JavaScript snippet directly into the
nodeinterpreter. This pattern of generating and executing code at runtime, while static in this implementation, is a vector for executing arbitrary logic.
Audit Metadata