contract diagram
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill is classified as suspicious due to an Arbitrary File Read (AFR) vulnerability and an Information Disclosure vulnerability in `server.js`. The `SKILL.md` explicitly instructs the AI agent to use path traversal (e.g., `../../epic-notes/webhook-contract.md`) when constructing the URL for the local server. The `server.js`'s GET endpoint for serving files (including those specified by the `md` URL parameter) does not sanitize `filePath` for path traversal, allowing arbitrary files to be read from the local filesystem. Additionally, the `/realpath` endpoint in `server.js` can be used to resolve arbitrary file paths, potentially leaking file existence or system structure, although it only returns the basename. There is no evidence of intentional malicious behavior like data exfiltration or persistence, but these are significant vulnerabilities.
