figma
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill fetches arbitrary design data from the Figma API and interpolates it directly into a prompt for the
geminiCLI tool. - Evidence: In
SKILL.md, theDesign to Code with AIsection shows$NODE(raw JSON from Figma) being injected into a React code generation prompt. - Ingestion points: Data enters the context via
curlrequests toapi.figma.com. - Boundary markers: Absent. No delimiters or instructions to ignore embedded commands are present in the interpolation string.
- Capability inventory: The agent uses the
geminiCLI to generate code, and shell redirection to write files. - Sanitization: Absent. Raw JSON objects are passed directly to the model.
- [Unverifiable Dependencies] (MEDIUM): The skill instructs users to install and use a non-standard global package and dynamic plugins.
- Evidence:
bun add -g @figma-export/cliandrequire('@figma-export/output-components-as-svg'). These are not from the [TRUST-SCOPE-RULE] list of trusted sources. - [Dynamic Execution] (MEDIUM): The use of a
.figmaexportrc.jsconfiguration file involves executing JavaScript that can include arbitraryrequirecalls and function executions. - Evidence: The provided config example uses
require(...)to load plugins at runtime. - [Data Exposure] (LOW): While the skill uses environment variables for tokens (good practice), it involves fetching content from dynamic URLs retrieved from an external API.
- Evidence: The
export-icons.shscript downloads data from$SVG_URLprovided by the Figma API.
Recommendations
- AI detected serious security threats
Audit Metadata