anki-ai-cli
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill documentation instructs the agent to execute the
anki-aipackage usingnpx, which involves downloading and running code from the npm registry. - [EXTERNAL_DOWNLOADS]: The
storeMediaFiletool supports downloading media content from arbitrary external URLs provided in the tool parameters. - [DATA_EXFILTRATION]: Multiple tools provide access to the local filesystem using absolute paths, which could be leveraged to read or write data beyond the Anki media folder.
- The
storeMediaFiletool can read from a local filepath. - The
retrieveMediaFiletool returns the content of media files in base64 format. exportPackage,importPackage, andguiImportFiletools accept absolute filesystem paths for operations.- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it retrieves and processes content from the user's Anki collection which may originate from untrusted external sources.
- Ingestion points: Tools such as
notesInfo,cardsInfo,findNotes, andfindCardsingest collection data. - Boundary markers: None identified in the tool schemas or instructions.
- Capability inventory: The skill possesses filesystem read/write access (
storeMediaFile,exportPackage), network connectivity (sync, URL-based media storage), and application control (guiExitAnki). - Sanitization: There is no documentation suggesting the validation or sanitization of data retrieved from the Anki collection before processing.
Audit Metadata