optimize-images
Warn
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/optimize-images.tsperforms dynamic loading of a local module (resolve-root.ts) from computed paths. It attempts to locate the file by parsing~/.claude/plugins/installed_plugins.jsonand checking theGEMSKILLS_ROOTenvironment variable. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted data from the local file system.
- Ingestion points: Reads image files from the
./public/imagesdirectory as identified inscripts/optimize-images.ts. - Boundary markers: No delimiters or instructions to ignore embedded content are used when processing image data.
- Capability inventory: The script has the capability to overwrite files on the disk using
Bun.writeand execute system commands for benchmarking. - Sanitization: No sanitization or validation of the input image content is performed before processing with the
sharplibrary. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
sharpimage processing library from standard package registries (NPM/Bun). - [COMMAND_EXECUTION]: The
SKILL.mdfile provides several shell command pipelines usingfind,du,ls,awk, andsortto audit image files and their sizes.
Audit Metadata