test-framework-2
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
ex.test.tsincludes a test case titled "ensure different path writing works" which useswriteFileSyncwith the path../../CLAUDE.md. This constitutes a path traversal vulnerability that could be used to write files outside of the intended project or temporary directories.\n- [PROMPT_INJECTION]: The traversal targetsCLAUDE.md, a file specifically used in agentic workflows to define operating instructions for the AI model. Overwriting this file is a known vector for persistent manipulation of the agent's behavior and environment.
Recommendations
- AI detected serious security threats
Audit Metadata