artifact-management
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: Path traversal vulnerability in the
createanddeleteactions withinrun.py. The script constructs file paths by joining a base directory with a user-provided name:filepath = _ARTIFACTS_DIR / name. Without validation or sanitization of thenameargument, an attacker can manipulate the path (e.g., using../sequences or absolute paths) to write to or delete files outside the intended directory, such as shell configuration files, system scripts, or critical user data. - [DATA_EXFILTRATION]: Path traversal vulnerability in the
readaction withinrun.py. Thereadfunction allows accessing files outside the designated artifacts folder because it does not verify that the resulting path is restricted to the base directory. This flaw enables the disclosure and exfiltration of sensitive information, including environment variables, private keys, and configuration files, by reading paths like~/.ssh/id_rsaor/etc/passwd.
Recommendations
- AI detected serious security threats
Audit Metadata