using-flowerpower
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Utility scripts in the
scripts/directory utilizesubprocess.runto execute theflowerpowerCLI and install the framework viapip. These interactions are used for project lifecycle management and use safe execution patterns (argument lists) that prevent shell injection. - [EXTERNAL_DOWNLOADS]: The
init_project.pyscript installs theflowerpowerpackage and its optional components (io,ui) from the official Python package index. This is the legitimate core framework authored bylegoutfor this skill. - [PROMPT_INJECTION]: The skill's architecture for processing data from S3 buckets and APIs represents a potential surface for indirect prompt injection.
- Ingestion points: Untrusted data is loaded via
pl.scan_parquet(source_uri)andfetch_external_api(url)within the pipeline examples. - Boundary markers: No explicit instruction delimiters are provided in the templates; however, data is typically handled within structured Polars DataFrames.
- Capability inventory: The framework allows for subprocess execution (via scripts), network requests (
requests), and file system writes (polars). - Sanitization: The skill explicitly includes and documents data validation patterns using the
Panderalibrary (e.g.,validate_schemainSKILL.md) to ensure that ingested data meets expected schemas.
Audit Metadata