design-doc-mermaid
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill includes several Python scripts (
extract_mermaid.py,mermaid_to_image.py, andresilient_diagram.py) that interface with the system to render diagrams. These scripts use thesubprocess.runmethod with arguments passed as a list, which effectively mitigates the risk of shell injection. This behavior is necessary for the skill's primary function of converting text to images using themmdcutility.\n- [EXTERNAL_DOWNLOADS]: The skill references and recommends the installation of@mermaid-js/mermaid-clivia NPM. As a well-known service maintained by the Mermaid.js organization, this dependency is considered safe and does not escalate the security verdict. No other external packages or scripts are downloaded at runtime.\n- [DATA_EXPOSURE]: Documentation examples within the skill, such as those for Spring Boot and Java WebApps, contain placeholder configurations and generic connection strings (e.g.,password="secure_password"). These are clearly identified as templates for user guidance and do not represent hardcoded credentials for the skill itself.\n- [INDIRECT_PROMPT_INJECTION]: The skill is designed to ingest and process Mermaid diagram code provided by users or extracted from local Markdown files. While this creates a potential surface for indirect prompt injection where malicious instructions could be embedded in diagram labels, the skill's use of hierarchical loading and specialized guides provides sufficient context to maintain operational focus on diagram generation. The capability to write to the filesystem is restricted to user-specified directories (defaulting to./diagrams/).
Audit Metadata