huashu-data-pro
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill instructions in
SKILL.mdandworkflows.mdstate that dependencies should be installed automatically without manual user intervention. This includes runningnpm install pptxgenjs playwright sharpandpip install pandas openpyxl python-pptx Pillow. Automatic package installation is a security risk as it can be used to pull malicious code if the package names or registries are compromised. - [COMMAND_EXECUTION] (LOW): The skill relies on executing various shell commands to process data and generate reports. This includes
npx playwright screenshotfor capturing HTML reports and executing Python/Node scripts via the command line. While functional, this provides a large attack surface for command injection if input is not properly sanitized. - [REMOTE_CODE_EXECUTION] (LOW): The instructions mention using
npx playwright install chromiumto download and install browser binaries. This is a form of remote code execution (downloading and executing an installer). - [INDIRECT_PROMPT_INJECTION] (LOW): This skill has a significant attack surface for indirect prompt injection.
- Ingestion points:
scripts/read_excel.pyandscripts/read_pptx.pyingest data from external user-provided files. - Boundary markers: No specific delimiters or "ignore instructions" warnings are defined for the data read from these files.
- Capability inventory: The skill can execute subprocesses, write files to the local system (
pptx.writeFile), and render content in a browser environment via Playwright. - Sanitization: There is no evidence of data sanitization before the external content is interpolated into HTML templates or reports.
Audit Metadata