excalidraw-export
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/export.pyscript executes external binaries includingresvgand Google Chrome usingsubprocess.runto perform image rendering. These calls use list-based argument passing, which is a secure practice to prevent shell injection, and are necessary for the skill's stated purpose. - [EXTERNAL_DOWNLOADS]: The
scripts/setup.shscript installs standard Python packages (fonttools,brotli) viapipand theresvgutility via Homebrew. These operations target official package registries and are documented for the user. - [DATA_EXFILTRATION]: The skill sends generated diagram data to
https://kroki.iovia HTTP POST requests inscripts/export.py. This is a well-known service used to render Excalidraw JSON into SVG format, and the data transfer is the intended core functionality of the skill.
Audit Metadata