ui-ux-pro-max
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Path traversal vulnerability in the file persistence logic. • File:
scripts/design_system.py. • Thepersist_design_systemfunction uses theproject_nameandpageparameters to construct directory and file paths usingpathlib.Path. These inputs are not sanitized for directory traversal sequences such as../, which could allow an attacker to write or overwrite files outside the intendeddesign-system/directory. - [EXTERNAL_DOWNLOADS]: Reference to an unverifiable third-party package. • File:
references/upstream-README.md. • The documentation recommends the global installation of an external NPM tooluipro-cli, which originates from a source not recognized as a trusted vendor. - [PROMPT_INJECTION]: Insecure handling of untrusted data leading to indirect injection surface. • Ingestion points: User-provided search queries and project names in
scripts/search.py. • Boundary markers: Absent. • Capability inventory: Filesystem write access and directory creation across the project tree viascripts/design_system.py. • Sanitization: Punctuation is removed from search queries during indexing inscripts/core.py, but the raw strings used for file persistence and path construction are not sanitized for special filesystem characters.
Audit Metadata