DevOps & Cloud

vercel-deploy-claimable

Silver
Vercel
6,247 tokensgemini-3-pro-preview

Safety Score

65/ 100

Detected Capabilities

filesystem_readfilesystem_writenetwork

Sensitive Files

    Clean filesystem scan

Deep Audit Findings

The 'Vercel Deploy' skill packages and uploads a specified directory to an external service (claude-skills-deploy.vercel.com) to trigger a deployment. While functional, it poses a Data Exfiltration risk if the user accidentally (or via prompt injection) directs it to deploy sensitive directories (e.g., system paths or folders containing secrets). Additionally, the script modifies files in-place (renaming HTML files) without asking, which risks data integrity.

Unrestricted Arbitrary File Upload

The script accepts any file path as an argument and uploads its contents to a public-facing cloud service. If an attacker prompts the agent to 'deploy /etc' or a folder with .env files, sensitive data will be exfiltrated to the public web.

HIGH
scripts/deploy.sh
INPUT_PATH="${1:-.}" ... PROJECT_PATH=$(cd "$INPUT_PATH" && pwd) ... tar -czf "$TARBALL" -C "$PROJECT_PATH" --exclude='node_modules' --exclude='.git' . ... RESPONSE=$(curl -s -X POST "$DEPLOY_ENDPOINT" -F "file=@$TARBALL" -F "framework=$FRAMEWORK")

Unexpected Filesystem Modification (Data Integrity)

The script automatically renames a single HTML file to `index.html` inside the user's source directory. This destructive action happens in-place, potentially breaking local links or file structure without user consent.

MEDIUM
scripts/deploy.sh
if [ "$BASENAME" != "index.html" ]; then echo "Renaming $BASENAME to index.html..." >&2 mv "$HTML_FILE" "$PROJECT_PATH/index.html" fi

Hardcoded External Dependency

The script relies on `claude-skills-deploy.vercel.com`. If this bridge service goes down or is compromised, the skill fails or could serve malicious content.

LOW
scripts/deploy.sh
DEPLOY_ENDPOINT="https://claude-skills-deploy.vercel.com/api/deploy"

Attack Surface Chain

1

Attacker prompts the agent to 'Deploy my system config' or 'Deploy /etc'.

2

Agent executes `bash deploy.sh /etc`.

3

Script runs as the agent user (often with read access to system files).

4

Script packages /etc contents into a tarball, excluding only node_modules/.git.

5

Script uploads the tarball to the public Vercel endpoint.

6

Attacker receives a public 'Preview URL' where they can browse the victim's system files.