plantuml
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The wrapper script
scripts/generate-diagram.shpasses all provided command-line arguments directly to theplantumlbinary using the"$@"pattern. While syntactically correct, this allows the agent to trigger any flag supported by the underlying tool without restriction. - [PROMPT_INJECTION]: The skill is designed to process diagram definitions (Category 8 surface) which may be sourced from untrusted external data such as pull request descriptions or user-provided files. Malicious instructions could be embedded in these definitions to attempt to influence the agent's behavior.
- Ingestion points: Diagram code provided in
.pumlfiles or via stdin as described inSKILL.md. - Boundary markers: None identified; diagram content is passed directly to the generation tool.
- Capability inventory: Subprocess execution of
plantuml, file read access for input files, and file write access for output diagrams. - Sanitization: No sanitization or validation of the diagram content is performed before processing.
- [DATA_EXFILTRATION]: The PlantUML engine supports the
!includedirective, as noted in the C4 architecture examples inSKILL.md. This capability could be exploited by a malicious diagram definition to include sensitive local files (e.g.,.env, SSH configurations) and render their contents into the generated image, facilitating data exposure.
Audit Metadata