context-pack
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/unpack.shscript is vulnerable to path traversal. It extracts file paths directly from the input markdown and uses them to create directories and write files viamkdir -pand redirection without any sanitization. A maliciously crafted context pack could use paths like../../path/to/sensitive/fileto overwrite arbitrary files on the system. - [COMMAND_EXECUTION]: The
scripts/pack.shscript usesunzipon user-provided ZIP archives. This is susceptible to 'Zip Slip' attacks if the archive contains entries with traversal characters (e.g.,../../), potentially overwriting files outside the intended temporary extraction directory. - [DATA_EXFILTRATION]: The skill is designed to aggregate codebase content for external consumption. While it includes a default exclusion list that covers
.envfiles, it does not explicitly block other sensitive directories like~/.ssh,~/.aws, or other credential-heavy locations if they are included in the source path. - [PROMPT_INJECTION]: The skill functions as a data aggregator for LLMs, creating an indirect prompt injection surface. If the files being packed contain malicious instructions or hidden markdown payloads, they will be passed into the context window of the AI agent consuming the pack, potentially hijacking its behavior.
Recommendations
- AI detected serious security threats
Audit Metadata