pexels-media
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill uses
curlandjqfor interacting with the Pexels API and processing JSON responses. These commands are used for their intended purpose and do not execute arbitrary user input. - [EXTERNAL_DOWNLOADS] (SAFE): Media and API requests are directed to
api.pexels.com,images.pexels.com, andvideos.pexels.com. These are legitimate domains for the skill's stated purpose. - [CREDENTIALS_UNSAFE] (SAFE): The skill correctly instructs the user to set the
PEXELS_API_KEYas an environment variable and does not contain hardcoded secrets. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface (Category 8):
- Ingestion points: API responses from Pexels (e.g.,
alttags, photographer names) are captured and saved to.meta.jsonfiles. - Boundary markers: None; external data is interpolated directly into a JSON structure via
jq. - Capability inventory: The skill uses
curlfor network access and writes to the local file system. - Sanitization: The use of
jqprovides inherent protection against command injection during the creation of the metadata file by properly escaping strings, but the content itself remains untrusted data that could influence the agent if read back into the prompt context later.
Audit Metadata