marimo-notebook
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/convert_notebook.pyexecutes themarimocommand-line tool usingsubprocess.runto convert notebook files. This is a legitimate use of the CLI to support notebook interoperability. - [EXTERNAL_DOWNLOADS]: The documentation describes installing necessary Python libraries like
marimoandwigglystufffrom standard package registries. It also notes that the conversion script can accept GitHub URLs to fetch and convert remote notebooks. - [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface through data ingestion. Ingestion points: Data analysis templates and SQL features ingest data from CSV, Parquet, and databases. Boundary markers: No specific delimiters or safety instructions are used when interpolating external data. Capability inventory: The skill can execute code, access files, and perform network operations. Sanitization: Subprocess calls use argument lists to prevent shell injection.
Audit Metadata