building-ai-chat
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The file
examples/tool-calling-chat.tsximplements acalculatetool that uses the JavaScripteval()function on anexpressionargument. Because this argument is generated by the AI based on user input, it allows an attacker to execute arbitrary code in the user's browser context. - COMMAND_EXECUTION (HIGH): The use of
eval()creates a command injection vulnerability. A malicious prompt could deceive the AI into producing a tool call containing executable code instead of a simple mathematical expression. - DATA_EXFILTRATION (LOW): In
references/multi-modal.md, thetranscribeAudiofunction sends data toapi.openai.com. This domain is not on the trusted whitelist, and while the data being sent is expected (audio), it constitutes a network operation to an external target without explicit boundary controls. - Indirect Prompt Injection (LOW): The skill provides code patterns for processing untrusted external data (images and files) in
examples/multimodal-chat.tsxandreferences/multi-modal.md. - Ingestion points:
handleImageUploadandFileInputcomponents. - Boundary markers: None are implemented in the provided prompt templates or code snippets.
- Capability inventory: Use of
fetch()for network requests andFileReaderfor data ingestion. - Sanitization: Only basic MIME type validation is performed; there is no sanitization of the content to prevent embedded instruction attacks.
Recommendations
- AI detected serious security threats
Audit Metadata