visualize-with-libraries
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- DATA_EXFILTRATION (MEDIUM): Potential Path Traversal in
src/lib/detector.ts. ThegetLocalIconPathfunction acceptsiconReffrom the untrustedbpmn_dataparameter and joins it to local paths usingpath.join. Because it only replaces the 'icon_' prefix and does not validate against parent directory references (..), an attacker could potentially probe for the existence of sensitive files elsewhere on the system by checking if they return a valid path for the SVG generator. - COMMAND_EXECUTION (LOW): Over-privileged Toolset. The
SKILL.mdfile requestsBash,glob, andgreppermissions. While the provided TypeScript source code does not explicitly invoke these tools via subprocesses, theVISUALIZER_SYSTEM_PROMPTinsrc/prompt.tsexplicitly instructs the agent to 'scan the root directory'. Granting shell-level tools to an agent for a visualization task creates an unnecessary attack surface. - PROMPT_INJECTION (LOW): Indirect Prompt Injection via SVG. In
src/lib/generator.ts, thetask.nameandtask.typefields are interpolated directly into the SVG<text>nodes without XML escaping or sanitization. - Ingestion points:
bpmn_dataparameter insrc/index.ts. - Boundary markers: None; content is directly embedded in string templates.
- Capability inventory:
fs.writeFileis used to save the resulting SVG to the project'soutput/directory. - Sanitization: Absent. This allows for 'SVG Injection' where a user could break the XML structure or attempt to include malicious payloads in the rendered output.
Audit Metadata