microsim-generator
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill automates the creation and validation of MicroSims by executing local Python scripts from a defined utility directory (
src/microsim-utils/). - Utilities include
extract-sim-specs.py,generate-sim-scaffold.py,validate-sims.py, andupdate-mkdocs-nav.py. - The skill also utilizes a local system utility,
bk-capture-screenshot, to generate preview images of the simulations using headless Chrome. - [EXTERNAL_DOWNLOADS]: Generated templates and guides include references to well-known JavaScript visualization libraries hosted on trusted Content Delivery Networks (CDNs).
- Sources include
jsdelivr.net,unpkg.com, andplot.ly. - Resources targeted are official distributions of
p5.js,Chart.js,Plotly.js,Mermaid.js,vis-network,vis-timeline, andLeaflet.js. - [PROMPT_INJECTION]: The skill incorporates a vulnerability surface for indirect prompt injection by ingesting and processing untrusted data from chapter files.
- Ingestion points: Chapter
index.mdfiles are parsed to extract simulation specifications (#### Diagram:headers). - Boundary markers: There are no specific markers or warnings instructed to the parsing logic to ignore embedded instructions within the user-provided markdown.
- Capability inventory: The skill possesses file-write capabilities (creating
.jsand.htmlfiles) and the ability to execute local Python scripts and a screenshot tool. - Sanitization: The skill does not explicitly provide for sanitization of extracted summary or spec text before it is interpolated into documentation or metadata files.
Audit Metadata