photo-color
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill contains a vulnerability surface where user-provided text is interpolated into a system prompt sent to GPT-5.
- Ingestion points: The
user_promptvariable in theanalyze_photo_promptfunction withinreferences/implementation.md. - Boundary markers: The prompt uses simple double-quote delimiters (
User prompt: "{user_prompt}") without explicit instructions to the model to ignore embedded commands. - Capability inventory: The skill can perform network requests to the OpenRouter API and write files to the disk using the PIL library.
- Sanitization: Malicious attempts to influence the output are neutralized by the
validate_multipliersfunction, which ensures that regardless of the LLM's response, the final adjustment values remain within a safe, non-destructive range. - External Downloads (SAFE): The skill connects to
openrouter.ai, which is a legitimate service. No untrusted third-party scripts or executables are downloaded or executed. - Command Execution (SAFE): No use of
os.system,subprocess, orevalwith user-controlled strings was detected. All image processing is handled via the Pillow (PIL) library. - Credentials Unsafe (SAFE): The skill requires an
OPENROUTER_API_KEY, but no real keys are hardcoded. Placeholders likesk-or-...andyour-key-hereare used correctly in the documentation.
Audit Metadata