auto-diagram
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the user to execute shell commands to start a local server using
npx excalidraw-toolkit start. While this is a common developer workflow for this specific tool, it involves downloading and executing external code at the user's discretion. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) because it is designed to ingest and process untrusted data from arbitrary codebases.
- Ingestion points: The analysis pipeline uses
ls,read_file,glob, andgrep(SKILL.md) to read file names and content from any repository the agent is directed to analyze. - Boundary markers: The instructions do not include boundary markers or explicit directives to the agent to ignore or isolate instructions that might be embedded within the files being read.
- Capability inventory: The agent has access to file system tools (
ls,read_file,grep,glob) and themcp__excalidraw__*tool suite for canvas manipulation. - Sanitization: No sanitization or validation of the content read from the codebase is performed before it is processed by the agent. An attacker could place malicious instructions in comments or metadata within a repository to influence the agent's behavior during analysis.
Audit Metadata