ascii-cli-logo-banner-figletjs
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/figlet_banner.mjsattempts to load thefigletmodule using dynamicimport()andrequire.resolve()from a list of computed paths. One of these paths isprocess.cwd(), which allows the script to load and execute code from the current working directory, posing a risk if the directory contains malicious modules. - [EXTERNAL_DOWNLOADS]: The skill requires the
figletnpm package and provides instructions for its installation from the npm registry. - [COMMAND_EXECUTION]: The skill's primary functionality is delivered through the execution of a Node.js script (
scripts/figlet_banner.mjs) that accepts user-provided text as command-line arguments. - [PROMPT_INJECTION]: The skill processes external text inputs which creates a surface for indirect prompt injection.
- Ingestion points: Input parameters
brand,slogan, andhintused byscripts/figlet_banner.mjs. - Boundary markers: No delimiters or warnings are used to differentiate untrusted data from instructions.
- Capability inventory: Rendered text output is written to
process.stdoutand included in the agent's context. - Sanitization: The skill does not validate or sanitize the text inputs before they are rendered into the ASCII banner.
Audit Metadata