web-artifacts-builder
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The scripts
init-artifact.shandbundle-artifact.shperform heavy-duty shell operations. Theinit-artifact.shscript is vulnerable to command injection because it directly interpolates the user-provided project name into shell commands likepnpm createandsed -iwithout any validation or sanitization. - EXTERNAL_DOWNLOADS (LOW): The skill installs over 50 Node.js packages from the npm registry at runtime. While these originate from a trusted source (npm), the large number of dependencies significantly expands the attack surface for supply chain vulnerabilities.
- INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted data (user-defined project name) and uses it to modify project files.
- Ingestion points:
PROJECT_NAME="$1"inscripts/init-artifact.sh. - Boundary markers: Absent.
- Capability inventory: Subprocess calls (
pnpm,npm,sed,tar), file system writes, and configuration updates. - Sanitization: Absent; the project name is used directly in string interpolation for shell commands, posing a risk of breakout if an attacker provides a name containing shell metacharacters like
;,&, or/.
Audit Metadata