flowerpower
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The management scripts (
run_pipeline.py,create_pipeline.py,list_pipelines.py) usesubprocess.runto invoke theflowerpowerCLI. These calls use the secure list-based argument passing format, which prevents shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The
init_project.pyscript performs a standard installation of theflowerpowerpackage from the Python Package Index (PyPI). This is a standard and expected operation for the skill's infrastructure. - [PROMPT_INJECTION]: The skill architecture creates an indirect prompt injection surface. Evidence: (1) Ingestion points:
source_uri,source_parquet, ands3_pathparameters inSKILL.mdandadvanced-patterns.md. (2) Boundary markers: No explicit delimiters are specified for ingested data. (3) Capability inventory: The skill can write to the filesystem viawrite_deltaand access the network usingrequests. (4) Sanitization: Examples demonstrate validation usingpanderato sanitize inputs and enforce schema compliance.
Audit Metadata