mermint-markdown-workflow
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Fetches and executes the
mermintCLI directly from the author's GitHub repository usingnpx. This allows the skill to render Mermaid diagrams from local markdown files. - [COMMAND_EXECUTION]: Executes shell commands including
mkdir,rsvg-convert,magick,rg, andgrepto manage files, generate image previews, and verify processing results. - [EXTERNAL_DOWNLOADS]: Downloads the
mermintpackage and potentially Playwright browser binaries from GitHub and standard registries during execution. - [PROMPT_INJECTION]: The skill represents a surface for indirect prompt injection as it ingests and processes untrusted markdown files. * Ingestion points: Reads Mermaid code blocks from markdown files (e.g.,
README.md) which could contain malicious instructions. * Boundary markers: No specific delimiters or instructions are used to prevent the agent from following instructions embedded within the processed diagrams. * Capability inventory: The skill can execute remote code vianpx, run shell commands for image processing, and perform file system operations. * Sanitization: No explicit sanitization or validation of the input markdown content is performed before processing.
Audit Metadata