generate-image
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The script
scripts/generate_image.pycontains acheck_env_filefunction that recursively scans the current and all parent directories for.envfiles to findOPENROUTER_API_KEY. This behavior can lead to the unintended exposure of secrets from unrelated projects or higher-level directories. - [DATA_EXFILTRATION] (HIGH): The script permits arbitrary local file access via the
--inputparameter. Any file readable by the user can be encoded and transmitted to the external OpenRouter API, posing a high risk of data exfiltration if the agent is directed to read sensitive files (e.g., SSH keys or configuration files). - [EXTERNAL_DOWNLOADS] (LOW): The skill performs network requests to
openrouter.ai, which is not on the trusted external sources list. While this is the intended service, it represents a non-whitelisted external dependency. - [PROMPT_INJECTION] (LOW):
SKILL.mduses 'IMPORTANT' and 'CRITICAL' directives to control agent behavior, which are classic indicators of behavioral manipulation. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface. 1. Ingestion points:
promptand--inputinscripts/generate_image.py. 2. Boundary markers: Absent. 3. Capability inventory:requests.postand file I/O inscripts/generate_image.py. 4. Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata