ComfyUI Painter

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill is suspicious due to a critical path traversal vulnerability in `scripts/civitai.py`. The `download_model` function uses `os.path.join` with a user-controlled `filename` parameter without sanitization, allowing an attacker to write arbitrary files to arbitrary locations on the filesystem (e.g., `../../../../tmp/malicious.sh`). If the download URL can also be controlled by the agent based on user input, this constitutes a Remote Code Execution (RCE) risk. Other shell executions via PowerShell and `curl` are present but appear to be used for legitimate purposes, though they could be exploited if `config.json` were compromised via another vulnerability.