comfyui-exploit
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Provides a functional exploit chain targeting CVE-2025-67303 and CVE-2026-22777 to achieve remote code execution on ComfyUI instances by manipulating security levels and installing malicious custom nodes.\n- [COMMAND_EXECUTION]: The
scripts/evil-git-server.pyscript executes multiple system commands viasubprocess.runto prepare an attack environment and defines a payload that executes arbitrary code on the target host.\n- [COMMAND_EXECUTION]: Instructions provide ready-madecurlcommands to manipulate remote server settings, including the use of URL-encoded CRLF characters (%0D) to perform configuration injection.\n- [PROMPT_INJECTION]: The skill includes instructions that override standard agent behavior by directing it to perform exploitation activities whenever ComfyUI management is discussed.
Recommendations
- AI detected serious security threats
Audit Metadata