chart-image
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
CAPABILITY.mdfile contains instructions that interpolate user-provided data directly into shell commands (e.g.,echo '${JSON.stringify(data)}' > /tmp/chart-data.json). If the data contains shell-breaking characters that the agent fails to escape, it could lead to arbitrary command execution.\n- [COMMAND_EXECUTION]: Thechart.mjsscript allows callers to specify arbitrary output paths via the--outputflag, and read arbitrary files via the--specflag. These could be used to overwrite sensitive system files or read non-public JSON files if the agent does not restrict access.\n- [PROMPT_INJECTION]: The skill represents an indirect prompt injection surface as it processes untrusted data (chart labels, titles, and event markers) which are then interpolated into the final visualization and potentially into command-line arguments.\n - Ingestion points:
data,title, andannotationsarguments in thelineChart,barChart, andareaChartmethods.\n - Boundary markers: Absent.\n
- Capability inventory: The skill executes the
scripts/chart.mjsscript vianodesubprocess calls to generate images.\n - Sanitization: While
JSON.stringifyis used in templates, there is no explicit shell escaping or validation of user-provided strings before they are used in CLI commands.
Audit Metadata