fal-generate
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION] (HIGH): The
upload.shscript enables the upload of arbitrary local files to the fal.ai CDN via the--fileargument. Ingestion points:upload.sh(line 63) accepts a file path directly from user input. Boundary markers: None present. Capability inventory: The script utilizesstatfor file metadata andcurl --data-binaryfor network transmission of file content. Sanitization: No validation or path restriction is implemented for the file input. Risk: An attacker could exploit this via indirect prompt injection to exfiltrate sensitive files such as SSH keys or local environment configurations. - [CREDENTIALS_UNSAFE] (MEDIUM): The skill stores sensitive API secrets in plaintext local files. Finding: The
--add-fal-keyfunctionality writes theFAL_KEYdirectly to a.envfile in the working directory. Risk: Storing credentials in plaintext on the filesystem is a significant security risk if the environment is accessed by unauthorized users or if the file is accidentally leaked. - [COMMAND_EXECUTION] (MEDIUM): Scripts execute shell commands and inline Python to handle data from external sources. Finding:
get-schema.shandsearch-models.shfetch JSON from the fal.ai API and process it using a heredoc-basedpython3script. Risk: This pattern increases the attack surface for malformed data from external APIs to exploit parsing logic or the shell environment. - [EXTERNAL_DOWNLOADS] (LOW): The skill makes network requests to
fal.aidomains which are not within the trusted external sources list.
Recommendations
- AI detected serious security threats
Audit Metadata