diagram-generator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The tool
generate_diagram_and_validateexecutes the string provided in thepython_codeparameter. This is a primary RCE vector as the code is interpreted at runtime. - [COMMAND_EXECUTION] (HIGH): There is no programmatic restriction on Python imports or functions, allowing an attacker to use modules like
osorsubprocessto execute shell commands within the interpreter environment. - [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) because it transforms user-influenced data into executable code. 1. Ingestion point:
python_codeparameter inSKILL.md. 2. Boundary markers: Absent. 3. Capability inventory: Full Python code execution via the Bedrock Code Interpreter. 4. Sanitization: Absent. Malicious instructions embedded in user requests or processed data could be used to generate and execute malicious Python code.
Recommendations
- AI detected serious security threats
Audit Metadata