scientific-paper-figure-generator
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill is vulnerable to path traversal during file saving. The
savemethod inscientific_paper_figure_generator.pycreates directories and writes files using theoutputargument without any path validation or sanitization. An attacker could provide a path like../../.bashrcto overwrite critical system or configuration files. - [DATA_EXFILTRATION] (MEDIUM): The skill facilitates unauthorized file access via path traversal. The
pd.read_csvcall in the main execution block uses the user-provided--datapath without validation, allowing the agent to be coerced into reading sensitive local files such as SSH keys or credentials if they can be parsed as CSV data. - [PROMPT_INJECTION] (HIGH): The skill presents an indirect prompt injection surface by ingesting untrusted external data. Ingestion points:
scripts/scientific_paper_figure_generator.py(line 144) viapd.read_csv. Boundary markers: None implemented to distinguish data from instructions. Capability inventory: Substantial file system write capabilities viaos.makedirsandfig.savefig. Sanitization: No validation, escaping, or filtering is performed on input data or file paths.
Recommendations
- AI detected serious security threats
Audit Metadata