implementing-figma-designs
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Prompt Injection] (SAFE): No instructions found that attempt to bypass safety filters or override system constraints.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file paths, or network exfiltration patterns detected. The skill focuses on local component development.
- [Obfuscation] (SAFE): The content is clear and uses standard Markdown/Code blocks. No hidden characters or encoded strings found.
- [Remote Code Execution] (SAFE): The skill does not perform external downloads or execute remote scripts. It provides instructions for local code editing.
- [Privilege Escalation] (SAFE): No use of sudo or commands aimed at acquiring elevated permissions.
- [Indirect Prompt Injection] (LOW):
- Ingestion points: Processes data from Figma designs via Figma MCP.
- Boundary markers: Absent in the instructions.
- Capability inventory: Has access to Bash, Write, and Edit tools to modify the local codebase.
- Sanitization: None specified for Figma data, but the context is limited to UI component generation which inherently limits the attack surface.
- [Command Execution] (SAFE): While Bash is an allowed tool, the instructions do not suggest any dangerous or arbitrary command execution patterns.
Audit Metadata