lovstudio-deploy-to-vercel
Warn
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Potential shell command injection in Step 5 and Step 4. User-provided input in the
$DOMAINvariable is directly interpolated into shell commands and pipelines (e.g.,echo "$DOMAIN" | awk ...,vercel domains add "$DOMAIN", andcurlURLs). If the domain string contains shell metacharacters like backticks, semicolons, or pipes, it could allow for arbitrary command execution. - [COMMAND_EXECUTION]: Potential for code injection in Step 3. The skill extracts the project name using
node -p "require('./package.json').name". If an attacker provides a maliciouspackage.jsonfile with a craftednamefield, it could lead to arbitrary Node.js code execution during the property extraction phase. - [EXTERNAL_DOWNLOADS]: The skill performs an automated global installation of the
vercelCLI (npm i -g vercel) if it is not already present on the system. While Vercel is a well-known service, global package installations modify the system environment. - [DATA_EXFILTRATION]: The skill requires and processes a sensitive
CLOUDFLARE_API_KEY. This key is transmitted toapi.cloudflare.comto manage DNS records. As this involves a well-known service for its intended purpose, it is documented as a neutral finding.
Audit Metadata