ui-revamp
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/report.jsutility uses theexecSyncfunction to execute a shell command constructed from thetargetPathargument. This argument is sourced directly from command-line inputs viaprocess.argvwithout any validation or escaping. (Evidence:scripts/report.jsline 20:const output = execSync("node ...")). - [REMOTE_CODE_EXECUTION]: The absence of sanitization for shell-interpolated variables allows for command injection. An attacker providing a path with shell control characters (e.g.,
;,&, or|) can execute arbitrary system commands, leading to full compromise of the host environment. - [PROMPT_INJECTION]: The skill presents an attack surface for indirect prompt injection by exposing high-privilege system capabilities (shell execution) to inputs (file paths) that may be influenced by untrusted external sources. Evidence Chain: 1. Ingestion points:
scripts/report.jsandscripts/audit.js(viaprocess.argv). 2. Boundary markers: None. 3. Capability inventory: Arbitrary shell execution viaexecSyncand file system access viafs.readFileSync. 4. Sanitization: None.
Recommendations
- AI detected serious security threats
Audit Metadata