Google Drive File Management
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The skill bundle is classified as suspicious due to multiple critical shell injection vulnerabilities found in `src/index.js` (and `src/index_corrected.js`). User-controlled inputs such as `filePath`, `customName`, `folder`, `query`, `fileType`, `email`, and `role`, as well as file names retrieved from Google Drive, are directly interpolated into shell commands executed via `child_process.exec` with `shell: true`. This allows for arbitrary command execution on the host system if an attacker can control these inputs, posing a significant Remote Code Execution (RCE) risk. There is no evidence of intentional malicious behavior, only severe vulnerabilities.
