kibana-vega
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Fetches and executes a setup script from the vendor's official domain (
elastic.co/start-local) to spin up local instances of Elasticsearch and Kibana via the shell. This is a vendor-provided installation method. - [COMMAND_EXECUTION]: Provides a CLI tool (
scripts/kibana-vega.js) that performs CRUD operations on Kibana saved objects using the Node.jsfetchAPI and processes local or piped configuration files. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted visualization specs and ES|QL queries.
- Ingestion points:
readStdin()andreadFileSync()inscripts/kibana-vega.jsread user-provided JSON/HJSON content. - Boundary markers: Absent; there are no delimiters or instructions to ignore embedded commands within the processed specs.
- Capability inventory: The skill has the capability to perform network requests to the Kibana API to create, update, or delete visualizations and dashboards.
- Sanitization: Relies on standard
JSON.parse()andhjson.parse(), which do not filter for malicious instructions within the data fields. - [CREDENTIALS_UNSAFE]: References the configuration of sensitive credentials (API keys, passwords) via environment variables for Kibana authentication. It includes an option to disable TLS certificate verification (
KIBANA_INSECURE="true") for development, which is a security risk in production environments.
Recommendations
- HIGH: Downloads and executes remote code from: https://elastic.co/start-local - DO NOT USE without thorough review
Audit Metadata