Dev Serve

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill is highly suspicious due to multiple critical vulnerabilities that allow remote code execution (RCE) and configuration injection. The `scripts/dev-serve.sh` script directly executes user-controlled commands derived from the `DEV_CMD` environment variable or the `scripts.dev` entry in a project's `package.json` file via `tmux send-keys`. This allows arbitrary shell commands to be executed. Additionally, user-controlled strings (derived from the repository name and `DEV_SERVE_DOMAIN`) are inserted into the `CADDYFILE` and `vite.config.*` files using `sed` without proper sanitization, creating Caddy configuration injection and JavaScript injection vulnerabilities. While these are vulnerabilities rather than explicit malicious intent by the skill developer, they pose a severe risk if the skill is used with untrusted input or if the AI agent is prompted to use it maliciously.