fal-api
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION] (LOW): Indirect Prompt Injection surface detected. The skill accepts user-provided prompts and sends them to external generative AI models.
- Ingestion points: The
promptparameter inFalAPI.generate_image,FalAPI.generate_video, andFalAPI.generate_and_waitinfal_api.py. - Boundary markers: Absent. The prompt is directly interpolated into the JSON payload for the API request.
- Capability inventory: Network requests (
urllib.request) to the fal.ai API. The skill returns URLs which may be processed by other agent tools. - Sanitization: Absent.
- [COMMAND_EXECUTION] (LOW): The skill uses the
subprocessmodule to interface with a local configuration tool. - Evidence:
subprocess.run(["clawdbot", "config", "get", f"skill.fal_api.{key}"], ...)infal_api.py. - Risk: While the command uses a list format to mitigate shell injection and the key name is typically hardcoded, calling external binaries introduces a dependency on the host environment's path and the integrity of the
clawdbotbinary. - [DATA_EXFILTRATION] (LOW): Network operations are performed to a non-whitelisted domain.
- Evidence:
self.QUEUE_URL = "https://queue.fal.run"and usage ofurllib.request.urlopeninfal_api.py. - Risk: The skill transmits user prompts and potentially source image/audio URLs to the fal.ai infrastructure. While expected for the skill's functionality, it constitutes data transmission to an external service provider.
Audit Metadata