awesome-code
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/cache.pyscript implements a caching mechanism using the Pythonpicklelibrary. Specifically, thepickle.load()function is used to read data from the local.awesome-code/cachedirectory. Unsafe deserialization viapickleis a known security risk that can allow for arbitrary code execution if the cached data is manipulated by a malicious actor. - [COMMAND_EXECUTION]: Several scripts, including
scripts/test_runner.py,scripts/code_analyzer.py, andscripts/performance_benchmark.py, utilize thesubprocess.run()method to execute development tools and tests. While these commands are configured using argument lists rather than shell strings to mitigate injection risks, this functionality provides the skill with extensive capabilities to run software on the user's system. - [EXTERNAL_DOWNLOADS]: The
mirror-optimizersub-agent and its associated scriptscripts/mirror_optimizer.pyare designed to configure external mirror sources for package managers like Docker, NPM, and PyPI. The registries referenced include well-known services provided by organizations such as Aliyun, Tencent, and major Chinese universities.
Audit Metadata