doc-mermaid-ascii
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/render.mjsexecutes the shell commandnpm root -gusingchild_process.execSyncto locate thebeautiful-mermaidpackage globally. It subsequently uses a computed path within animport()call to load the module, which constitutes dynamic loading from a computed path. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its processing of Mermaid diagram code.
- Ingestion points: Mermaid source text is ingested via command-line arguments, input files, or standard input in
scripts/render.mjs. - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the script's processing logic.
- Capability inventory: The script possesses capabilities for file system access (
readFileSync,writeFileSync) and command execution (execSync). - Sanitization: There is no evidence of sanitization or validation of the input diagram syntax before it is passed to the rendering engine.
- [DATA_EXFILTRATION]: The
scripts/render.mjsscript performs file read and write operations on paths provided by the user. While intended for reading diagrams and saving output, this capability could be exploited to expose sensitive files if the agent is provided with malicious paths.
Audit Metadata