es-ingest
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/ingest.jsimplements a transformation feature that dynamically loads and executes JavaScript code from a file path provided via the--transformcommand-line argument usingimport()andrequire(). This mechanism allows for the execution of arbitrary code on the host system if the agent is instructed to use a malicious script. - [CREDENTIALS_UNSAFE]: Sensitive Elasticsearch credentials, including API keys and passwords, are accepted as command-line arguments (
--api-key,--password, etc.) inscripts/ingest.js. This practice is insecure as command-line arguments are often visible to other users and system monitoring tools via the process list (e.g., usingpsor/proc), leading to potential credential exposure.
Audit Metadata