networkx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Dynamic Execution (MEDIUM): The files
references/graph-basics.mdandreferences/io.mdprovide examples and recommendations for usingpickle.load()andnx.read_gpickle()for data serialization. These methods are inherently insecure because they can execute arbitrary code contained within a malicious data file. Loading an untrusted pickle file could allow an attacker to execute commands on the host system. - Indirect Prompt Injection (LOW): The skill documentation describes multiple ingestion points for external data, which creates a vulnerability surface for indirect prompt injection if the data sources are controlled by an attacker.
- Ingestion points:
references/io.mddetails various file-reading functions such asread_adjlist,read_edgelist,read_graphml,read_json, andpd.read_sql_query. - Boundary markers: The code snippets do not provide delimiters or instructions to ignore embedded commands within the data being processed.
- Capability inventory: The skill includes capabilities for file system modification (writing graph files) and unsafe deserialization via pickle, which could be leveraged if a malicious prompt is ingested.
- Sanitization: No logic is provided in the documentation for validating or sanitizing external graph data before processing.
Audit Metadata