1688-product-search
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/smart_recommend.pyutilizessubprocess.runto invoke theproduct_search.pyscript. Although it employs list-based argument passing (which prevents shell injection), it executes commands using parameters sourced from user queries. - [DATA_EXFILTRATION]: Several scripts, including
scripts/image_search_handler.pyandscripts/product_search_updated.py, perform network requests (requests.get) to arbitrary URLs provided by the user. This functionality facilitates the retrieval of external images but represents a Server-Side Request Forgery (SSRF) risk surface when interacting with non-whitelisted domains. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it ingests and processes untrusted data from external sources:
- Ingestion points: User-provided image URLs and search strings processed in the
smart-searchandimage-searchfunctions. - Boundary markers: The skill lacks delimiters or instructions to ignore potential malicious content embedded in the downloaded data or processed queries.
- Capability inventory: The skill possesses capabilities including subprocess execution, local file system writes for temporary image storage, and external network requests.
- Sanitization: Sanitization is limited to basic URL parsing and image extension checks, alongside the use of list-based arguments in subprocess calls.
Audit Metadata