customizing-controltemplate
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The C#
TemplateHelper.CreateTemplatemethod utilizesXamlReader.Loadto dynamically instantiate objects from a provided string. - Evidence: The
CreateTemplate(string xaml)method inSKILL.mdconverts a UTF-8 string into aMemoryStreamand passes it directly toXamlReader.Load(stream, context). - Risk: XAML parsing is functionally equivalent to code execution; maliciously crafted XAML can use features like
ObjectDataProviderto invoke arbitrary system methods or launch external processes when the XAML is loaded. - [COMMAND_EXECUTION]: The skill introduces a significant vulnerability surface for indirect injection or data-driven attacks through its helper logic.
- Ingestion points: The
xamlparameter in theTemplateHelper.CreateTemplatemethod (File:SKILL.md). - Boundary markers: None identified; the method processes the raw string input without delimiters or warnings to ignore embedded instructions.
- Capability inventory: The skill enables dynamic .NET object instantiation which can be escalated to shell execution or system manipulation via XAML injection techniques.
- Sanitization: None; the implementation lacks validation, XML schema enforcement, or sanitization to prevent the use of high-risk XAML elements.
Audit Metadata