artifacts-builder
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The script
scripts/init-artifact.shis vulnerable to shell command injection via the project name argument. The variable$PROJECT_NAME, assigned from the first positional argument$1, is interpolated into asedcommand without sanitization on line 62:$SED_INPLACE 's/<title>.*<\/title>/<title>'"$PROJECT_NAME"'<\/title>/' index.html. An attacker can escape the shell string by including single quotes and execute arbitrary commands (e.g.,proj'; touch /tmp/pwned; '). - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill performs multiple external downloads and installations. It installs
pnpmglobally usingnpm install -g pnpm, usespnpm create viteto generate projects, and installs over 50 frontend dependencies and bundling tools (parcel,html-inline) from public registries. This introduces significant supply chain risk. - [COMMAND_EXECUTION] (MEDIUM): The skill uses
node -eto dynamically modifytsconfig.jsonandtsconfig.app.json. While the logic is currently hardcoded, this pattern of dynamic execution for configuration management increases the complexity and potential attack surface for environment-based exploits.
Recommendations
- AI detected serious security threats
Audit Metadata