mermaid

Pass

Audited by Gen Agent Trust Hub on Apr 22, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The scripts/check_mermaid.py script downloads and installs the nodeenv package from PyPI. It subsequently uses nodeenv to download a specific version of the Node.js runtime from its official source (nodejs.org). Additionally, it uses npx to fetch and execute @mermaid-js/mermaid-cli from the official NPM registry.
  • [COMMAND_EXECUTION]: The script uses the subprocess.run method to execute various environment management and validation tools, including uv, pip, nodeenv, and npx. These commands are executed using list-based arguments, which is a secure practice that prevents shell injection vulnerabilities.
  • [DATA_EXPOSURE]: The script creates and maintains a cache directory in the user's local application data or cache folder (~/.cache/creative-writing-skills/mermaid-validator) to store the Node.js runtime and associated tools. This is a standard and transparent behavior for development utilities.
  • [REMOTE_CODE_EXECUTION]: The skill uses npx --yes @mermaid-js/mermaid-cli to perform diagram validation. While this involves fetching and running remote code, it targets a well-known, established package from the official NPM registry for a clearly defined functional purpose.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 22, 2026, 12:03 PM