update-workflow-diagram
Warn
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches external tools and images during execution.
- Downloads the
@mermaid-js/mermaid-clipackage from the NPM registry. - Pulls and runs the
minlag/mermaid-cliimage from Docker Hub, which is a third-party community image not associated with a verified or trusted organization. - [REMOTE_CODE_EXECUTION]: Executes code from external sources.
- Runs arbitrary code contained within the
minlag/mermaid-cliDocker container on the local host. - [COMMAND_EXECUTION]: Executes several local commands and scripts.
- Runs repository-specific scripts:
scripts/setup-tmp.shandscripts/website-lint.sh. - Initiates a local web server using
python -m http.server 3000for verification, which could potentially expose local files if the working directory contains sensitive data. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection via the processed diagram file.
- Ingestion points: Processes content from
docs/agents.mdby extracting Mermaid code blocks. - Boundary markers: Uses
sedto isolate content between mermaid code fence markers, providing a basic structural boundary. - Capability inventory: Possesses capabilities to execute shell scripts, write to the file system (
website/ai-workflow.svg), and run a local network server. - Sanitization: No validation or sanitization of the extracted Mermaid DSL is performed before it is passed to the rendering engine, potentially allowing for specialized injection attacks targeting the renderer or subsequent SVG processing.
Audit Metadata