file-path-traversal-testing

skills-sh:sickn33_antigravity-awesome-skills__file-path-traversal-testing

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

11

Score

0/100

HIGH 11

Findings (11)

HIGH
Path traversal attempt
L225

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

../../../etc/passwd
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Path traversal attempt
L298

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

%2e%2e/
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Path traversal attempt
L299

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

%2e%2e%
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Path traversal attempt
L378

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

%2e%2e/
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Path traversal attempt
L379

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

%2e%2e%
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Base64-encoded instructions
L659

Detects instructions to decode and execute base64 content

base64-encode/resource=config
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Base64-encoded instructions
L670

Detects instructions to decode and execute base64 content

base64,PD9waHAgc3lzdGVtKCRfR0VUWydjJ10pOyA/Pg==
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Path traversal attempt
L692

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

%2e%2e%
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Path traversal attempt
L900

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

../../../etc/passwd
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.

HIGH
Base64-encoded instructions
L908

Detects instructions to decode and execute base64 content

base64-encode/resource=config
FIX

Remove text that simulates multi-turn conversations or fake user/assistant message pairs. These patterns attempt to manipulate the agent by fabricating conversation history.

FP?

Likely FP if the matched text is documentation showing example conversations or API request/response formats for illustration purposes.

HIGH
Path traversal attempt
L936

Detects path traversal patterns targeting sensitive files, including URL-encoded variants

%2e%2e%
FIX

Pin Git dependencies to specific commit hashes instead of branch names or tags. Branches and tags are mutable and can be updated to point to malicious code.

FP?

Likely FP if the Git reference points to a tagged release of a well-known repository, though tags are technically mutable.