anywidget-generator
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to generate code (Python and JavaScript) based on user-provided descriptions, creating a significant attack surface.
- Ingestion points: User prompts or data describing widget functionality in
SKILL.mdinstructions. - Boundary markers: Absent. There are no instructions to the agent to treat user-provided data as untrusted or to wrap it in delimiters.
- Capability inventory: The generated code executes within a notebook environment. Python code has access to the underlying filesystem (explicitly encouraged via
pathlib), and JavaScript code executes in the user's browser session (Cross-Site Scripting risk). - Sanitization: Absent. The skill does not provide any logic for escaping or validating user input before interpolating it into the generated code blocks.
- [Command Execution] (MEDIUM): The skill's core purpose is the dynamic generation and execution of code. While inherent to the 'anywidget' framework, the instruction to use
pathlibfor external_esmand_csspaths could be manipulated to read sensitive system files (e.g., SSH keys or environment files) and render them into the widget's UI.
Recommendations
- AI detected serious security threats
Audit Metadata