web-artifacts-builder
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The scripts
init-artifact.shandbundle-artifact.shexecute numerous shell commands to manage files, configure the environment, and build the project. - Evidence: Frequent use of
pnpm install,sed,cat, andtarin both scripts. - EXTERNAL_DOWNLOADS (MEDIUM): The skill downloads and installs a large number of dependencies from the npm registry during both initialization and bundling.
- Evidence:
npm install -g pnpmand extensive lists of React/shadcn dependencies ininit-artifact.shandbundle-artifact.sh. - REMOTE_CODE_EXECUTION (MEDIUM): The script executes
npm install -g pnpm. Global installations modify the host environment and execute code from an external source with high privileges. - Evidence:
npm install -g pnpmininit-artifact.sh. - INDIRECT PROMPT INJECTION (LOW): The skill is vulnerable to indirect prompt injection through its ingestion of user-controlled files or project names.
- Ingestion points: The
<project-name>argument ininit-artifact.shand existingpackage.jsonorindex.htmlfiles inbundle-artifact.sh. - Boundary markers: Absent. No delimiters or instructions are used to separate untrusted data from shell commands.
- Capability inventory: Capability to execute
pnpm install(which runs lifecycle scripts),pnpm exec parcel, and file-writing viacatandsed. - Sanitization: Absent. Project names and file contents are used directly in shell commands (e.g.,
sedand directory creation).
Audit Metadata