screen-design-doc
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill's
package.jsonspecifies a dependency onpdf-parse@^2.4.5. This version does not exist in the official NPM registry (the latest stable version is 1.1.1), making it an unverifiable dependency and a potential vector for dependency confusion or malicious package substitution.\n- [COMMAND_EXECUTION]: The skill workflow inSKILL.md(Step 2) instructs the agent to execute shell commands using theBashtool to run a local Node.js script. This command interpolates user-provided file paths (<입력.pdf>) directly into the shell string, which can lead to command injection if the filenames contain shell metacharacters and are not properly escaped by the agent.\n- [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection by processing untrusted content from user-uploaded documents.\n - Ingestion points: The skill reads and extracts text from user-provided
.pdf,.txt, and.mdfiles via theextract_pdf_text.jsscript and theReadtool.\n - Boundary markers: There are no instructions for the agent to use XML tags, delimiters, or system-level headers to isolate the extracted document content from its internal reasoning and planning instructions.\n
- Capability inventory: The skill is granted
Bash,Read, andWritepermissions, allowing it to execute scripts and modify the workspace based on processed input.\n - Sanitization: No sanitization or validation logic is present to filter or escape potentially malicious instructions embedded within the source documents before they are analyzed for Information Architecture (IA) and screen design generation.
Audit Metadata