baoyu-image-gen
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is vulnerable to command injection through shell interpolation of environment variables.
- Evidence: In
scripts/providers/google.ts, the functionpostGoogleJsonViaCurlconstructs a shell command using template literals and executes it viaexecSync. The variables${proxyArgs}and"${url}", which are derived directly from environment variables such asGOOGLE_BASE_URL,https_proxy, andHTTPS_PROXY, are not sanitized. - Risk: An attacker can influence these environment variables by providing a malicious
.baoyu-skills/.envfile in a project directory. For example, settingGOOGLE_BASE_URLto a value likehttps://example.com" ; touch /tmp/exploit ; #would cause the shell to execute the injected command when the skill is run. - [EXTERNAL_DOWNLOADS]: The skill communicates with well-known technology service providers to perform its primary function of image generation.
- Evidence: The skill makes network requests to
generativelanguage.googleapis.com(Google),api.openai.com(OpenAI),dashscope.aliyuncs.com(Alibaba Cloud), andapi.replicate.com(Replicate). - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it processes untrusted input from external files and reference images.
- Ingestion points: Prompt data is ingested from files specified via the
--promptfilesflag inscripts/main.ts. - Boundary markers: The content of multiple prompt files is concatenated using double newlines without additional delimiters or instructions for the agent to ignore potential instructions within the data.
- Capability inventory: The skill possesses
bashexecution capabilities, network access, and file-write permissions, which could be abused if an injection is successful. - Sanitization: No sanitization or safety-filtering is applied to the content of the external prompt files before they are included in requests to the AI models.
Recommendations
- AI detected serious security threats
Audit Metadata