excalidraw
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
🔴 VERDICT: HIGH
This skill demonstrates a high capability for command execution and permission modification, primarily through its setup.sh script and the explicit invocation of render.js in SKILL.md. While the external dependencies (Node.js packages and fonts) are sourced from generally trusted locations, the methods used to acquire and prepare them involve direct command execution, which could be exploited if the skill's instructions were altered or if a dependency was compromised.
Total Findings: 6
🔴 HIGH Findings: • COMMAND_EXECUTION
- scripts/setup.sh:10:
npm install - Risk: The skill executes
npm install, which downloads and runs code from external sources. This grants the skill the capability to execute arbitrary code on the system. While the listed dependencies are common, a malicious actor could inject harmful packages or alter thepackage.jsonto install malicious code. • COMMAND_EXECUTION - scripts/setup.sh:20:
python3 -c "..." - Risk: The skill executes arbitrary Python code. Although the provided code is for a benign font conversion, this demonstrates the ability to run any Python command, which could be used for malicious purposes. • COMMAND_EXECUTION
- scripts/setup.sh:29:
unzip -qo cascadia.zip -d cascadia_extract - Risk: The skill executes the
unzipcommand on a downloaded archive. While the source is trusted, unzipping arbitrary archives can be a vector for path traversal attacks or resource exhaustion (zip bomb) if the source were to become untrusted. • COMMAND_EXECUTION - scripts/setup.sh:30:
find cascadia_extract -name "CascadiaCode*.woff2" ... | head -1 | xargs -I{} cp {} "$FONT_DIR/CascadiaCode.woff2" - Risk: The skill executes a complex shell pipeline involving
find,head,xargs, andcp. This demonstrates advanced command execution capabilities, which could be repurposed for malicious file manipulation or data exfiltration. • PRIVILEGE_ESCALATION - scripts/setup.sh:36:
chmod +x "$SCRIPT_DIR/render.js" - Risk: The skill explicitly modifies file permissions to make
render.jsexecutable. While necessary for its function, this action demonstrates the ability to change file permissions, which could be abused to make other, potentially malicious, files executable. • COMMAND_EXECUTION - SKILL.md:10:
node <skill_dir>/scripts/render.js /tmp/<name>.excalidraw /tmp/<name>.png - Risk: The core functionality of the skill involves executing a Node.js script with user-controlled input and output paths. This is a direct command execution. Although the paths are within
/tmp, the script's ability to process arbitrary JSON and write files could be a vector for resource exhaustion or other local file system abuses if the JSON input is not properly sanitized by therender.jsscript itself.
🔵 LOW Findings: • EXTERNAL_DOWNLOADS
- scripts/setup.sh:17:
curl -sL "https://cdn.jsdelivr.net/npm/@excalidraw/excalidraw@0.17.6/dist/excalidraw-assets/Virgil.woff2" - Risk: Downloads a font file from
cdn.jsdelivr.net. This is a trusted CDN for open-source projects. Downgraded to LOW/INFO. • EXTERNAL_DOWNLOADS - scripts/setup.sh:26:
curl -sL "https://github.com/microsoft/cascadia-code/releases/download/v${CASCADIA_VERSION}/CascadiaCode-${CASCADIA_VERSION}.zip" - Risk: Downloads a font archive from
github.com. This is a trusted source. Downgraded to LOW/INFO.
================================================================================
- AI detected serious security threats