filmkit-fujifilm-camera
Fail
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The documentation instructs users to execute
sudo udevadm control --reload-rules && sudo udevadm triggeron Linux systems. Running commands with elevated privileges (sudo) to modify system hardware rules (udev) poses a high risk if the user does not fully understand the implications of the change or if the rules are malicious.- [EXTERNAL_DOWNLOADS]: The skill requires users to download the application source code from an unverified GitHub repository (https://github.com/eggricesoy/filmkit.git). This involves fetching code from a source that is not a well-known service or trusted organization.- [REMOTE_CODE_EXECUTION]: After cloning the repository, users are instructed to runnpm installandnpm run dev. This results in the execution of scripts and the installation of dependencies from an unverified source, which can lead to the execution of malicious code on the user's machine.- [DATA_EXFILTRATION]: The skill uses the WebUSB API to communicate directly with Fujifilm cameras via the PTP protocol. This grants the application capability to read camera properties and transfer raw image files (RAF). While intended for preset management, this level of hardware access could be leveraged to access sensitive data stored on the camera.- [PROMPT_INJECTION]: The skill processes external data (presets) via URL parameters or text input. This data is decoded usingatob()and parsed withJSON.parse(). This represents an ingestion point for untrusted data that could potentially influence the application's behavior if the data is not properly validated before use.
Recommendations
- AI detected serious security threats
Audit Metadata