bun-runtime
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides documentation and examples for using Bun's native shell execution utilities (
Bun.$). - Evidence:
SKILL.mddemonstrates running commands likels -la,git branch, andnpm run builddirectly from the runtime. - [DATA_EXFILTRATION]: The provided example for a file upload handler contains a path traversal vulnerability surface that could lead to unauthorized file writing or system compromise.
- Ingestion points: User-controlled data enters the system through
req.formData()in the server example withinSKILL.md. - Boundary markers: No delimiters, validation, or warnings regarding the safety of user-provided filenames are present in the documentation.
- Capability inventory: The skill exposes capabilities for
Bun.write,Bun.fileaccess, andBashcommand execution. - Sanitization: The example code fails to sanitize input, directly using
file.namein a write operation:await Bun.write("./uploads/${file.name}", file), which allows an attacker to manipulate the target path using directory traversal sequences.
Audit Metadata