layout-architect
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Arbitrary File Access and Path Traversal. The entry point in
src/index.tsutilizesyargsto accept--inputand--outfile paths from the user. These paths are resolved usingpath.resolvewithout any boundary checks or validation against a secure base directory. This allows a user or a malicious process to point the tool to sensitive system files (e.g., SSH keys or configuration files) for reading, or to specify arbitrary output locations to overwrite critical files with generated CSS content. - [PROMPT_INJECTION]: Indirect Prompt Injection Surface. The
generateMarpCSSfunction insrc/lib.tsperforms direct string interpolation of properties from theMasterSlideSpecsobject into a CSS template literal without escaping or sanitization. - Ingestion points: Specification data enters the skill via the file read from
specsPathinsrc/index.ts. - Boundary markers: The skill does not employ boundary markers or instructions to ignore embedded malicious sequences within the processed design specifications.
- Capability inventory: The skill possesses file-system read (
fs.readFileSync) and write (safeWriteFile) capabilities. - Sanitization: There is no evidence of validation or escaping for the data fields before they are embedded into the resulting CSS, which could lead to CSS injection if the source specification file is compromised.
Audit Metadata