fal-3d
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The
scripts/generate-3d.shscript demonstrates a surface for indirect prompt injection by constructing JSON payloads through direct string concatenation of user-supplied arguments.\n - Ingestion points: The
--prompt,--image-url, and--paramarguments inscripts/generate-3d.shwhich are likely to contain user-provided content.\n - Boundary markers: Absent; the script does not employ delimiters or instructions to the receiving API to treat the content as untrusted.\n
- Capability inventory: The script performs network requests via
curltohttps://queue.fal.run.\n - Sanitization: None; the script interpolates shell variables directly into a JSON string template without escaping double quotes, which could allow an attacker to escape the intended field and inject additional JSON keys.
Audit Metadata