image-enhancement
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- Privilege Escalation (HIGH): The skill instructs the user or agent to execute
sudo apt-get install imagemagick. The use ofsudoto acquire elevated permissions is a high-severity finding as it can be exploited if the agent executes commands automatically. - Indirect Prompt Injection (LOW): The skill is vulnerable to indirect injection through malicious file metadata or filenames.
- Ingestion points: Processes local image files (e.g.,
input.png,*.png) which are considered untrusted external data. - Boundary markers: Absent. There are no instructions or delimiters provided to ensure the agent ignores embedded instructions or treats filenames as literal strings.
- Capability inventory: The skill uses shell commands (
convert) and Python'sPILlibrary to process files. The bash loopfor f in *.png; do convert "$f" ...is particularly susceptible to command injection if a filename contains shell metacharacters. - Sanitization: Absent. There is no evidence of escaping, validation, or filtering of filenames or image content before processing.
Recommendations
- AI detected serious security threats
Audit Metadata