turborepo-caching
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill includes a code template for a self-hosted remote cache server that contains a vulnerability surface for indirect injection and path traversal.
- Ingestion points: The Express.js server template in
SKILL.mddirectly usesreq.params.hashandreq.query.teamIdto construct file paths. - Boundary markers: There are no delimiters or instructions provided to the agent or system to ignore potentially malicious content within the cached artifacts.
- Capability inventory: The template utilizes
fs.createReadStream,fs.createWriteStream, andfs.promises.mkdirfor file system operations based on the untrusted input. - Sanitization: The template does not include any sanitization, validation, or path normalization for the
hashorteamvariables, which could allow an attacker to read or write files outside the intended cache directory via path traversal (e.g., using../). - [EXTERNAL_DOWNLOADS]: The skill references several well-known and trusted tools, including Vercel's Turborepo, GitHub Actions (
actions/checkout,actions/setup-node), and standard Node.js package managers. These references are documented neutrally as they originate from trusted or well-known organizations.
Audit Metadata