ui-ux-pro-max
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]:
- The
SKILL.mdfile contains instructions prompting the agent to perform system-level installations usingsudo apt install python3,brew install python3, andwinget install. The use of elevated privileges (sudo) poses a risk if executed without user oversight. - The
persist_design_systemfunction indesign_system.pyconstructs file paths by concatenating a base directory with user-supplied project and page names. Because the code only replaces spaces with dashes and fails to sanitize path traversal characters (e.g.,../), a malicious input could allow writing generated markdown files to arbitrary directories on the system. - [PROMPT_INJECTION]:
- Ingestion points: User-provided search queries, project names, and page identifiers processed by the
search.pyCLI utility. - Boundary markers: Absent; the generated design system files (
MASTER.mdand page overrides) do not use delimiters or explicit instructions to prevent the agent from interpreting embedded data as new instructions. - Capability inventory: The skill possesses file system write capabilities (
mkdirandopen) and the ability to execute its own Python scripts via the agent's CLI. - Sanitization: Insufficient; the script's sanitization is limited to simple character replacement, leaving the system vulnerable to indirect prompt injection and path manipulation payloads.
Audit Metadata