plantuml-ascii
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Privilege Escalation] (HIGH): The documentation explicitly instructs the use of
sudo apt-get installandsudo yum install. These commands acquire administrative privileges, which is a high-risk operation for an AI agent to perform or suggest in a standard workflow. - [Unverifiable Dependencies & Remote Code Execution] (HIGH): The skill suggests downloading a JAR file from
https://github.com/plantuml/plantuml/releases/download/v1.2024.0/plantuml-1.2024.0.jarand executing it withjava -jar. Since theplantumlGitHub organization is not on the provided trusted list, this constitutes an untrusted remote code execution vector. - [Indirect Prompt Injection] (LOW): The skill processes untrusted user data (diagram definitions) and passes it to the
Bashtool to generate output. There are no sanitization steps or boundary markers to prevent the input from potentially containing malicious instructions targeted at the agent or the underlying shell environment. - Ingestion points: User-provided PlantUML text passed to the agent to create files.
- Boundary markers: None; diagrams are written directly to files and processed.
- Capability inventory: Uses
Bashfor command execution,Writefor file creation, andReadfor viewing results. - Sanitization: No escaping or validation is performed on the user-provided diagram content before shell processing.
Recommendations
- AI detected serious security threats
Audit Metadata