web-artifacts-builder

Warn

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/init-artifact.sh modifies the global system environment by executing npm install -g pnpm if the package manager is not detected.
  • [COMMAND_EXECUTION]: The scripts/init-artifact.sh script uses node -e to dynamically execute JavaScript code for manipulating tsconfig.json and tsconfig.app.json files during the setup process.
  • [COMMAND_EXECUTION]: The init-artifact.sh script contains a shell injection vulnerability in the sed command where the $PROJECT_NAME variable is concatenated into a command string without sufficient sanitization.
  • [EXTERNAL_DOWNLOADS]: The skill triggers multiple large-scale downloads from the NPM registry, including the Vite build tool, Tailwind CSS, Parcel, and over 40 Radix UI and shadcn/ui components.
  • [REMOTE_CODE_EXECUTION]: The scripts use pnpm exec to run third-party binaries such as parcel and html-inline, which execute code locally to build and bundle the final application artifact.
  • [COMMAND_EXECUTION]: The init-artifact.sh script performs an unverified extraction of a local tarball shadcn-components.tar.gz into the project source directory.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 9, 2026, 04:37 AM