test-framework-2

Fail

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The file ex.test.ts includes a test case titled "ensure different path writing works" which uses writeFileSync with the path ../../CLAUDE.md. This constitutes a path traversal vulnerability that could be used to write files outside of the intended project or temporary directories.\n- [PROMPT_INJECTION]: The traversal targets CLAUDE.md, a file specifically used in agentic workflows to define operating instructions for the AI model. Overwriting this file is a known vector for persistent manipulation of the agent's behavior and environment.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 5, 2026, 08:23 PM