qwen-edit
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Command Execution] (MEDIUM): The skill relies on a local CLI tool located at
tools/image_edit.pyto perform its tasks. Multiple files, includingSKILL.mdandparameters.md, demonstrate usage where user-controlled parameters (prompts and file paths) are passed directly as command-line arguments. This creates a surface for command injection if the script utilizes unsafe execution methods likeos.systemorsubprocess.run(shell=True)without rigorous sanitization. - [Indirect Prompt Injection] (MEDIUM): Vulnerability surface identified. Ingestion points: User-provided image files and prompt strings passed to the
image_edit.pytool. Boundary markers: None observed in the prompt templates provided inprompting.md. Capability inventory: Execution of a local Python script with CLI arguments as shown inSKILL.md. Sanitization: None described in documentation. This combination allows external content to influence the arguments of a local command execution. - [Data Exposure & Exfiltration] (LOW): The skill documentation indicates interaction with RunPod serverless endpoints. While this is the intended purpose of the skill, it involves sending data (potentially sensitive images) to a non-whitelisted external domain.
Audit Metadata