piclist-upload
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The script
scripts/process.shperforms file deletion (rm -f) on paths extracted directly from Markdown content. Because the script does not validate if the resolved paths are within a restricted workspace or a safe directory, a malicious Markdown file could use absolute paths or path traversal (e.g.,) to target sensitive system or user files for deletion.- [DATA_EXFILTRATION] (LOW): The skill is designed to read local file data and transmit it to a network endpoint viacurl. While the default is a local server (127.0.0.1), the endpoint is configurable via thePICLIST_SERVERenvironment variable. If an attacker controls this variable, they could exfiltrate any file referenced in a processed Markdown document to an external server.- [INDIRECT_PROMPT_INJECTION] (LOW): The skill is vulnerable to malicious instructions within the data it processes. Ingestion points:scripts/process.shreads Markdown files provided as arguments. Boundary markers: None; the script parses and acts upon any string matching the Markdown image pattern. Capability inventory: Network transmission (curl), file deletion (rm -f), and file reading (cat). Sanitization: Minimal; the script resolves paths without verifying if they reside within an allowed directory.
Audit Metadata