using-kuzenbo-in-apps
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The library provides components that ingest structured data from props which are then rendered using methods that could be exploited if the data is attacker-controlled.
- Ingestion points: Data passed to the
configprop ofChartContainerinsrc/components/chart/chart.tsxand thedataprop ofQRCodeinsrc/components/qr-code/qr-code.tsx. - Boundary markers: Absent; there are no delimiters or instructions to the agent to ignore embedded commands in the processed data.
- Capability inventory: The library uses
dangerouslySetInnerHTMLinchart-style.tsxandqr-code.tsxto render dynamically generated content. - Sanitization:
src/components/qr-code/qr-code.tsximplements basic sanitization via regex for OKLCH color values, butChartStyleperforms no explicit sanitization on the keys used for CSS variable generation. - Dynamic Execution (LOW): Executable UI content is assembled and injected into the DOM at runtime.
- Evidence:
src/components/chart/chart-style.tsxusesdangerouslySetInnerHTMLto inject dynamically generated CSS variables into a<style>block. - Evidence:
src/components/qr-code/qr-code.tsxusesdangerouslySetInnerHTMLto render the SVG string generated by theqrcodepackage.
Audit Metadata