beautiful-mermaid
Warn
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
beautiful-mermaidandshikipackages from the NPM registry. The core functionality is provided by thebeautiful-mermaidlibrary, hosted on a public GitHub repository. - [COMMAND_EXECUTION]: The documentation includes a Fish shell integration example that is vulnerable to command injection. It uses an unsanitized shell variable (
$argv[1]) within anode -eexecution string. An attacker providing a filename containing shell metacharacters or JavaScript escape sequences (e.g.,' + process.exit() + ') could execute arbitrary code when the function is invoked. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting and rendering untrusted diagram definitions.
- Ingestion points: Mermaid diagram strings passed to the
renderMermaidandrenderMermaidAsciifunctions inSKILL.md. - Boundary markers: Absent; inputs are interpolated directly into the rendering engine.
- Capability inventory: The provided usage patterns include file system read/write operations (
fs.readFileSync,fs.writeFileSync), console logging, and web server response handling (res.send). - Sanitization: Absent; the library's documentation explicitly states that it does not perform syntax validation on diagram inputs.
Audit Metadata