brand-studio
Warn
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
references/logo-creator.mdsuggests using Python code involvingsubprocessandcairosvgto convert SVG logos. This pattern encourages the agent to generate and execute code at runtime. - [COMMAND_EXECUTION]: The
SKILL.mdfile mentions a Python hook script located athooks/brand_guard.pyfor automated branding enforcement. Because this file is not provided in the skill package, its behavior remains unverifiable, constituting a potential security risk. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing external data and user-controlled configuration.
- Ingestion points: The agent reads from
brand-config.md(populated by user answers) and documents from/mnt/user-data/uploads/. - Boundary markers: None identified. Instructions do not mandate the use of delimiters or 'ignore' instructions for data interpolation.
- Capability inventory: The skill allows for Python code execution (suggested for logos), file system writing (brand-config.md), and automated document generation (Word, PPTX, HTML).
- Sanitization: None identified. Data provided by the user is directly interpolated into various output formats without validation.
Audit Metadata