fal-tryon
Fail
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/tryon.shscript is vulnerable to argument injection through user-supplied parameters. - User input from arguments like
--model,--person-url, and--garment-urlis directly interpolated into acurlcommand string within double quotes. - An attacker can inject a double quote character in these fields to break out of the quoted string and append arbitrary arguments to the
curlcommand. - Evidence:
RESULT=$(curl -s -X POST "https://fal.run/$MODEL" ... -d "$PAYLOAD")inscripts/tryon.sh. - [DATA_EXFILTRATION]: The argument injection vulnerability in the
curlcommand can be exploited to read and exfiltrate sensitive local files. - By injecting arguments such as
--upload-fileor using the@prefix with the-dflag, an attacker could instructcurlto transmit the contents of local files (e.g., SSH keys, configuration files) to a remote server under their control. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection by processing external image URLs without sanitization.
- Ingestion points: The
--person-urland--garment-urlparameters inscripts/tryon.shaccept untrusted external input. - Boundary markers: Absent. The URLs are passed directly to the backend API without validation or containment.
- Capability inventory: The script performs network operations via
curlto thefal.aiAPI. - Sanitization: Absent. No validation is performed on the provided URLs or the resulting JSON payload.
Recommendations
- AI detected serious security threats
Audit Metadata