huashu-xhs-image
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill workflow involves executing several local scripts and system utilities to perform its tasks.
- Evidence:
SKILL.mdcontains instructions to executeuv run,python3,npx playwright, and the macOSopencommand for file operations and previews. - [CREDENTIALS_UNSAFE]: The skill is designed to retrieve API credentials from a local environment file on the user's filesystem.
- Evidence:
SKILL.mdusesgrep GEMINI_API_KEY ~/.claude/.envto source credentials for the image generation script. - [DATA_EXFILTRATION]: The skill intentionally uploads generated assets to an external image hosting provider.
- Evidence: Step 5 in
SKILL.mddescribes the use of a local scriptupload_image.pyto send images to ImgBB and return public links. - [EXTERNAL_DOWNLOADS]: The skill relies on external tools and APIs that may perform downloads at runtime.
- Evidence: The use of
npx playwrighttypically involves downloading browser binaries if they are not already cached, and the Python script connects to Google's Gemini API. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it interpolates user-provided text into AI prompts.
- Ingestion points: User-provided titles, keywords, and themes in
SKILL.mdStep 1. - Boundary markers: Absent; user text is placed directly into the prompt template in Step 3.
- Capability inventory: The skill can execute subprocesses, perform network requests, and write to the local filesystem.
- Sanitization: No sanitization or validation of user input is performed before interpolation into the prompt.
Audit Metadata