fal-kling-o3
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
kling-generate.shandkling-video.shcontain a high-severity command execution vulnerability. - The
--add-fal-keyparameter writes user-provided input directly into a.envfile using the commandecho "FAL_KEY=$2" > .env. - Because the scripts subsequently load this file using
source ".env", any shell command substitution (such as$(...)) included in the input will be executed by the shell. - This allows for both immediate command execution and persistent backdoors if a malicious key is saved.
- [CREDENTIALS_UNSAFE]: The skill stores sensitive API keys in plain text in a local
.envfile, which increases the risk of credential exposure if the file system is accessed by unauthorized users or other processes. - [PROMPT_INJECTION]: The skill is vulnerable to JSON injection (schema confusion) when constructing API requests.
- User input from the
--promptand--paramarguments is interpolated directly into thePAYLOADvariable using double quotes without any escaping or validation. - An attacker can inject special characters like double quotes to terminate the intended JSON field and inject additional fields into the request sent to
queue.fal.run. - [EXTERNAL_DOWNLOADS]: The skill makes network requests to
queue.fal.run. This is the official endpoint for the fal.ai service and is consistent with the skill's stated purpose and author context.
Recommendations
- AI detected serious security threats
Audit Metadata