W-Spaces Deploy
PassAudited by VirusTotal on May 18, 2026.
Findings (1)
The skill provides a set of tools for deploying static websites to wspaces.app, but it contains several security vulnerabilities. Specifically, `wspaces_auth.sh` and `wspaces_project.sh` manually construct JSON payloads using unescaped shell variables, which is a classic JSON injection vulnerability. Furthermore, `wspaces_auth.sh` encourages passing sensitive passwords as command-line arguments, which can expose them in system process lists. While the core logic appears to serve its stated purpose and `wspaces_push.sh` correctly uses Python for JSON escaping, the lack of consistent input sanitization across the bundle poses a risk in an AI agent environment.
