pw-image-generation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): Hardcoded sensitive credentials were found in multiple files. File
config/secrets.mdcontains a live-looking API keysk-1p6RyJLH3e3TnfMEfN9clcwZru2V513pAIwK8h5fMVUTDnEv. Additionally,scripts/upload-image.tscontains a hardcoded API key for thefreeimage.hostservice within a shell command string. - [COMMAND_EXECUTION] (MEDIUM): The scripts
merge-to-long-image.tsandupload-image.tsutilizechild_process.execandexecSyncto run external binaries such asconvert(ImageMagick) andcurl. While filenames are quoted, the lack of strict input validation on parameters derived from user input or directory listings poses a risk of command injection. - [DATA_EXFILTRATION] (MEDIUM): The
upload-image.tsscript provides a direct mechanism to send local file content to public image hosting providers (sm.msandfreeimage.host). Because the script does not verify the file type or content before uploading, it could be used to exfiltrate sensitive files (like SSH keys or configuration files) if an attacker can control the file path argument. - [EXTERNAL_DOWNLOADS] (LOW):
scripts/analyze-image.tsdownloads data from arbitrary URLs provided via command-line arguments and saves them to the local filesystem without domain restrictions. - [PROMPT_INJECTION] (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8). 1. Ingestion points: Command-line arguments in
analyze-image.tsandupload-image.tsaccept untrusted URLs and paths. 2. Boundary markers: None; external inputs are interpolated directly into operations. 3. Capability inventory: File system read/write, shell command execution, and external network requests. 4. Sanitization: No validation or escaping is performed on the data retrieved from external sources before it is processed.
Recommendations
- AI detected serious security threats
Audit Metadata