extract-diagrams
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The bash command
grep -n '@preview/cetz' $ARGUMENTSinSKILL.mdis vulnerable to shell command injection. The$ARGUMENTSvariable is interpolated directly into the shell script without sanitization, allowing for arbitrary command execution via shell metacharacters (e.g., semicolons, pipes). - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the processing of untrusted
.typfiles. - Ingestion points: Data is ingested from external files via the
ReadandBash(grep) tools. - Boundary markers: No delimiters or isolation instructions are used to distinguish untrusted file content from system instructions.
- Capability inventory: The skill possesses
BashandReadcapabilities, which could be exploited if the agent executes instructions found within the processed files. - Sanitization: No validation or sanitization is performed on the content of the source files before processing.
Recommendations
- AI detected serious security threats
Audit Metadata