edit-image
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/edit.tsuses dynamicimport()to load dependencies from paths calculated at runtime. It attempts to locate the plugin root by checkingprocess.env.GEMSKILLS_ROOTand searching through.claude/plugins/installed_plugins.jsonand cache directories. Dynamic loading from non-static paths is a notable execution surface. - [DATA_EXPOSURE_AND_EXFILTRATION]: The script
scripts/edit.tsreads the content of~/.claude/plugins/installed_plugins.jsonand lists directories in~/.claude/plugins/cache/to resolve paths. Accessing hidden configuration files in the user's home directory is a sensitive operation. - [INDIRECT_PROMPT_INJECTION]: The skill incorporates user-provided text into model prompts without sanitization, creating a surface for indirect prompt injection.
- Ingestion points: The
promptandinputPath(image path) parameters inscripts/edit.ts. - Boundary markers: None identified; user input is passed directly to utility functions.
- Capability inventory: The script can write files to the local disk via the
saveImagefunction inscripts/edit.ts. - Sanitization: No validation or escaping is applied to the input text before processing.
Audit Metadata