implementing-figma-designs

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No instructions found that attempt to bypass safety filters or override system constraints.
  • [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file paths, or network exfiltration patterns detected. The skill focuses on local component development.
  • [Obfuscation] (SAFE): The content is clear and uses standard Markdown/Code blocks. No hidden characters or encoded strings found.
  • [Remote Code Execution] (SAFE): The skill does not perform external downloads or execute remote scripts. It provides instructions for local code editing.
  • [Privilege Escalation] (SAFE): No use of sudo or commands aimed at acquiring elevated permissions.
  • [Indirect Prompt Injection] (LOW):
  • Ingestion points: Processes data from Figma designs via Figma MCP.
  • Boundary markers: Absent in the instructions.
  • Capability inventory: Has access to Bash, Write, and Edit tools to modify the local codebase.
  • Sanitization: None specified for Figma data, but the context is limited to UI component generation which inherently limits the attack surface.
  • [Command Execution] (SAFE): While Bash is an allowed tool, the instructions do not suggest any dangerous or arbitrary command execution patterns.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:52 PM