lazycat-lpk-builder
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
lzc-manifest.ymlspecification supports aninjectsfield, which allows applications to load and execute scripts from external HTTPS sources. - Evidence:
references/manifest-spec.mddemonstrates an example configuration where a script is fetched fromhttps://dev.example.com/inject.jsand injected into matched HTML pages. - [COMMAND_EXECUTION]: The skill facilitates the execution of arbitrary shell commands through build and initialization scripts.
- Evidence: The
buildscriptfield inlzc-build.yml(referenced inSKILL.mdandreferences/build-spec.md) defines a script (e.g.,sh build.sh) to be executed on the host during the packaging process. - Evidence: The
setup_scriptfield inlzc-manifest.ymlallows for the execution of root-level commands within the service container before the main application starts. - [EXTERNAL_DOWNLOADS]: The skill describes methods for automatically fetching and installing software dependencies from remote repositories.
- Evidence: The
devshellconfiguration inreferences/build-spec.mdspecifies the installation of packages likenodejs,npm, andpython3from well-known mirrors (Tsinghua and NPM Mirror). - [COMMAND_EXECUTION]: The documentation provides instructions on how to grant applications high-level privileges, such as
netadmin(for network system calls) and full Dockerprivilegedmode. - Evidence:
references/manifest-spec.mddetails thenetadminboolean andreferences/troubleshooting.mdexplains usingcompose_overrideto grant capabilities likecap_addorprivileged: trueto containers.
Audit Metadata