svg-diagram
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The function
mermaidToSvginSKILL.mduseschild_process.execSyncto execute a shell command string constructed from user-suppliedoptions. Because variables such aswidth,height, andbgColorare concatenated into the string without sanitization or escaping, an attacker could inject arbitrary shell commands if these values are derived from untrusted input. - [REMOTE_CODE_EXECUTION]: The skill executes
npx mmdcto perform diagram rendering. This command dynamically downloads and runs themermaid-clipackage from the npm registry at runtime, which constitutes remote code execution of unvetted and unpinned external code. - [EXTERNAL_DOWNLOADS]: The skill fetches a font stylesheet from
cdn.jsdelivr.netto support Korean character rendering in the generated SVG files. This is documented neutrally as a functional dependency on a well-known content delivery service. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes complex, untrusted Mermaid syntax that is subsequently passed to a renderer and shell-based CLI. Ingestion points:
mermaidCodeandoptionsparameters inmermaidToSvg. Boundary markers: Absent. Capability inventory:execSync(shell access),fs(file system operations), andnpx(unvetted remote code execution). Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata