image-gen
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Prompt Injection] (HIGH): The skill is vulnerable to indirect prompt injection (Category 8) due to its core functionality and associated agent capabilities.
- Ingestion points: The skill processes user-provided text prompts in
SKILL.mdandreferences/editing.md. Additionally, theimage-prompteragent uses theWebFetchtool to ingest external content. - Boundary markers: No delimiters or safety instructions are used to isolate untrusted user input from the agent's internal logic.
- Capability inventory: The skill provides templates for file system writes (
fs.writeFileSyncinSKILL.mdandreferences/integration.md), network access, and the execution of external binaries (magick,rembg). - Sanitization: There is no evidence of input validation or prompt sanitization to prevent adversarial instructions from influencing the agent's operations.
- [External Downloads] (MEDIUM): The skill promotes the use of external packages from untrusted sources.
- Evidence:
references/integration.mdsuggests installingrembg(via pip) and@imgly/background-removal-node(via pnpm/npm). These packages are not within the defined trusted organization scope. - [Command Execution] (MEDIUM): Documentation encourages the use of shell commands to process images.
- Evidence:
references/integration.mdprovides examples for executingmagick,cwebp, andrembgCLI tools. While functional, this pattern exposes the environment to risks associated with subprocess management. - [Data Exposure] (LOW): The skill accesses sensitive environment variables and local files.
- Evidence: Accesses
process.env.GEMINI_API_KEYand performs file I/O operations (e.g.,fs.readFileSyncinreferences/editing.md). This is expected for an image generation skill but confirms the persistent access to the local file system.
Recommendations
- AI detected serious security threats
Audit Metadata