marimo-notebook

Pass

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/convert_notebook.py executes the marimo command-line tool using subprocess.run to convert notebook files. This is a legitimate use of the CLI to support notebook interoperability.
  • [EXTERNAL_DOWNLOADS]: The documentation describes installing necessary Python libraries like marimo and wigglystuff from standard package registries. It also notes that the conversion script can accept GitHub URLs to fetch and convert remote notebooks.
  • [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface through data ingestion. Ingestion points: Data analysis templates and SQL features ingest data from CSV, Parquet, and databases. Boundary markers: No specific delimiters or safety instructions are used when interpolating external data. Capability inventory: The skill can execute code, access files, and perform network operations. Sanitization: Subprocess calls use argument lists to prevent shell injection.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 1, 2026, 10:27 PM