multimodal-gen
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (MEDIUM): The skill programmatically accesses the host's secret store by executing the
passutility (subprocess.run(['pass', 'api/xingjiabiapi'])) to retrieve an API key in the filesgenerate_image.py,generate_video.py, andprompt_optimizer.py. This capability could be used to exfiltrate other local secrets if modified.\n- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill communicates with the non-whitelisted domainxingjiabiapi.comand downloads media files from various external URLs (e.g.,s3.ffire.cc) based on API responses. This creates a risk of interacting with untrusted or malicious endpoints.\n- [COMMAND_EXECUTION] (LOW): Local shell commands are used viasubprocess.runto orchestrate the internal Python scripts and interact with system tools likepass. While the paths are currently restricted to the skill's own directory, the capability exists.\n- [PROMPT_INJECTION] (LOW): The skill is vulnerable to Indirect Prompt Injection. User-controlled text is interpolated directly into model prompts without sanitization or boundary markers. Evidence chain: 1. Ingestion points:SKILL.md(via{用户描述}) andgenerate.py(viasys.argv). 2. Boundary markers: Absent. 3. Capability inventory: Network requests (POST/GET), file writing, and subprocess execution. 4. Sanitization: Absent.
Audit Metadata