libtv-skill
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The script
scripts/upload_file.pyimplements functionality to read local files and transmit them to a remote server. - Evidence: The script uses
open(file_path, "rb")to read file content andurllib.request.urlopento send data tohttps://im.liblib.tv/openapi/upload. - Vulnerability: The MIME type validation
if mime_type and not any(...)is bypassed whenmimetypes.guess_typereturnsNone(common for files without extensions like.envor SSH keys), permitting the exfiltration of sensitive data to the remote endpoint. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection through untrusted data processing.
- Ingestion points: User messages in
scripts/create_session.pyand API response data inscripts/query_session.py. - Boundary markers: There are no boundary markers or instructions to isolate untrusted content.
- Capability inventory: The skill possesses both local file read access (
scripts/upload_file.py) and network request capabilities (scripts/_common.py). - Sanitization: No sanitization or validation is performed on inputs from the user or the external API.
Recommendations
- AI detected serious security threats
Audit Metadata