canvas-template
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local scripts (
scripts/canvas_template.pyandscripts/canvas_validate.py) via thepython3interpreter. User-provided data, including the canvastitleand various template-specific parameters, is interpolated directly into the shell command strings. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection (Category 8) where malicious instructions could be embedded in the user-provided parameters.
- Ingestion points: User-provided
titleand template parameters (e.g.,slide_count,step_count) defined inSKILL.md. - Boundary markers: The instructions attempt to use double quotes as delimiters (e.g.,
title="[title]") to wrap user input in the shell command. - Capability inventory: The skill has the capability to execute shell commands and write to the local filesystem at the specified
output_pathas seen inSKILL.md. - Sanitization: There is no evidence in the provided
SKILL.mdof input validation or sanitization to prevent characters like backticks, semicolons, or additional quotes from breaking out of the command string.
Audit Metadata