diagrams
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
render-elk.mjsis vulnerable to command injection through its use ofexecSyncwith unsanitized filenames. When the--pngflag is enabled, filenames from the input directory are interpolated directly into a shell command for thesipsutility. An attacker who can place files with malicious names containing shell command substitution (e.g.,$(whoami).json) in the target directory can achieve arbitrary code execution on the host system. - [COMMAND_EXECUTION]: The skill uses
createRequire(process.cwd() + '/')to dynamically load theelkjsdependency from the user's current working directory. This pattern can lead to the execution of untrusted code if the agent is operating within a compromised project directory where the localnode_modulesfolder has been tampered with. - [EXTERNAL_DOWNLOADS]: The skill instructions in
SKILL.mdrequire the user to manually install theelkjspackage from the npm registry, which is an external dependency necessary for the rendering script to function.
Recommendations
- AI detected serious security threats
Audit Metadata