mermaid
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): Both
scripts/render_mermaid.pyandscripts/validate_mermaid.pycan trigger the download of a Chromium binary from Google's servers if the--install-chromiumflag is used. This process involves the runtime acquisition and execution of a large external binary blob. - COMMAND_EXECUTION (MEDIUM): The scripts utilize
subprocess.runto call themmdc(Mermaid CLI) tool. While diagrams are passed via temporary files, executing external system binaries on data derived from user input is a security-sensitive operation. - DATA_EXFILTRATION (LOW): The scripts allow the agent to read arbitrary local files via the
--inputparameter. While intended for processing Mermaid source files, this capability could be used to read sensitive local data if the agent's behavior is influenced by a malicious prompt.
Audit Metadata