evolve
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
engine.pyscript utilizessubprocess.runto invoke thelsofutility andos.killto manage local server processes on a project-specific port range (8800-9799). These actions are scoped to theservecommand and are necessary for local preview functionality. - [EXTERNAL_DOWNLOADS]: The
recraft.pymodule performs network requests toexternal.api.recraft.aito generate and download SVG/PNG assets. This interaction is authenticated via an environment-provided API key and is required for the design generation features. - [DYNAMIC_EXECUTION]: The
engine.pyscript usesimportlibto perform lazy loading of internal modules (memory.py,detect.py,recraft.py). This modular loading is a standard architectural pattern for the skill's CLI and is performed using local relative paths. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it ingests contents from the local repository and generated HTML files to use as context for sub-agent design tasks.
- Ingestion points: Repository scanning in
detect.py(CSS, YAML, JSON) and reading generated HTML files inengine.pyfor 'mutation' and 'survivor' prompts. - Boundary markers: No explicit delimiters or boundary markers are documented in the prompt construction logic to isolate untrusted file content.
- Capability inventory: The agent has capabilities to write files, manage local processes, and perform network requests to image generation services.
- Sanitization: Repository file contents are processed and interpolated into prompts without specific sanitization or filtering logic.
Audit Metadata