aliyun-solution-article-illustrator

Pass

Audited by Gen Agent Trust Hub on Apr 2, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses subprocess.run in scripts/run_workflow.py to execute helper scripts like load_preferences.py and build_outline.py. These calls use list-based arguments and do not invoke a shell, which is a secure method for executing internal sub-processes.
  • [PROMPT_INJECTION]: The skill ingests user-provided Markdown articles to derive image generation prompts. This represents an indirect prompt injection surface where a crafted article could attempt to influence the instructions sent to the image generation backend.
  • Ingestion points: The source article is read from the path provided to the --source argument in scripts/run_workflow.py.
  • Boundary markers: None explicitly implemented in the provided scripts to separate user content from prompt templates.
  • Capability inventory: The skill can write files to the local filesystem and execute subprocesses via run_workflow.py.
  • Sanitization: No visible sanitization of the input article content before it is used to build prompts.
  • [DATA_EXPOSURE]: The scripts/load_preferences.py script accesses configuration files from the user's home directory (~/.alicloud-skills/.../EXTEND.md) and the project root. This is a standard practice for persistent user preferences and is limited to specific filenames.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 2, 2026, 03:34 AM