canvas
Warn
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses multiple shell commands including
curl,cp,python3,identify, andfind. These commands are constructed by interpolating user-provided inputs like URLs and file paths (e.g.,curl -sL [url] -o ...andImage.open('[path]')), which can be exploited for command injection if the inputs contain shell metacharacters. - [EXTERNAL_DOWNLOADS]: The
add imageoperation usescurlto download files from arbitrary, user-specified URLs. This allows the agent to fetch remote content into the local filesystem. - [REMOTE_CODE_EXECUTION]: The use of
python3 -cfor aspect ratio detection and temporary file manipulation involves executing Python code with parameters derived from user input, increasing the risk of code injection and execution in the local environment.
Audit Metadata