dreamina-upload-image
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATION
Full Analysis
- [Data Exposure & Exfiltration] (HIGH): The Python code in
SKILL.mdimplements a file upload workflow that reads local files usingopen(image_path, 'rb')and sends the binary content to a remote ByteDance endpoint viarequests.post. Because there is no logic to verify that the file is an image or that the path is restricted to a safe directory, the skill can be abused to exfiltrate any file the execution environment has permissions to read.\n- [Indirect Prompt Injection] (LOW): The skill provides an exploit surface where untrusted input (theimage_path) controls which local data is processed and sent externally.\n - Ingestion points:
image_pathparameter in theupload_imagefunction.\n - Boundary markers: Absent; there are no delimiters or instructions to prevent the processing of malicious file paths.\n
- Capability inventory: Local file system read access (
open) and outbound network capabilities (requests).\n - Sanitization: Absent; the code does not perform path normalization, extension checks, or MIME-type validation.
Recommendations
- AI detected serious security threats
Audit Metadata