histolab
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): The skill provides the ability to read arbitrary files from the local system via the
slide_pathparameter in theSlideclass (references/slide_management.md). While intended for medical images, an attacker could attempt to point this to sensitive files. It also allows writing to the disk viaprocessed_pathandsave_thumbnail(). - Indirect Prompt Injection (HIGH): The skill possesses a significant attack surface by processing untrusted external data with write capabilities.
- Ingestion points: Untrusted data enters the agent context through the
slide_pathparameter and the resultingSlideobject properties (references/slide_management.md). - Boundary markers: None identified. The documentation does not specify the use of delimiters or instructions to ignore embedded data markers.
- Capability inventory: The skill can perform file system reads (opening WSI files) and file system writes (
save_thumbnail, creating tiles inprocessed_path). - Sanitization: There is no evidence of path sanitization or validation of the image content/metadata before processing. If image metadata (e.g., vendor-specific fields) is interpolated into subsequent prompts, it could influence agent behavior.
Recommendations
- AI detected serious security threats
Audit Metadata