brand-logo
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes a local validation utility located at
~/Development/brand-kit/dist/src/cli.jsto processbrand.yamlcontent. It also performs shell-based image processing usingnpxand aforloop. - [EXTERNAL_DOWNLOADS]: Uses
npxto fetch and executesvgoandsharp-cli. These are well-known image optimization and manipulation tools from the public npm registry. - [PROMPT_INJECTION]: The skill interpolates external data into LLM instructions, creating an attack surface for both direct and indirect injection.
- Ingestion points: Data is ingested from the
brand.yamlfile and the user-provided--promptargument. - Boundary markers: The prompt template lacks explicit delimiters or instructions for the LLM to ignore potentially malicious commands embedded in the brand identity data.
- Capability inventory: The skill has the capability to execute local scripts via
node, download/execute packages vianpx, and write files to the local directory (e.g.,assets/andbrand.yaml). - Sanitization: There is no evidence of sanitization or escaping of the brand name, colors, or personality traits before they are interpolated into the generation prompt.
Audit Metadata