interactive-architecture-diagram
Fail
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: A fallback API key is hardcoded directly within the source code of the client script.
- Evidence: In
scripts/cw_client.cjs, theloadApiKeyfunction returns a hardcoded UUID (94a05d02-9ade-4d9d-9f39-88734d9e34b4) if the environment variableCONTEXTWEAVE_MCP_API_KEYis not set. - [DATA_EXFILTRATION]: The skill is designed to transmit user-provided technical descriptions and architectural diagrams to external domains.
- Evidence:
scripts/cw_client.cjsperforms POST requests containing user data tohttps://pptx.chenxitech.siteandhttps://api.contextweave.site. - [COMMAND_EXECUTION]: The skill requires the agent to execute Node.js scripts to perform its core functions, including file system and network operations.
- Evidence:
SKILL.mddefines templates for executingscripts/generate_contextweave.cjs,scripts/import_contextweave_code.cjs, and other scripts via thenodebinary. - [PROMPT_INJECTION]: The skill processes untrusted user input which could be used to manipulate diagram generation or exploit the processing pipeline.
- Ingestion points: User requests are ingested via the
user_requestargument and from files specified byinput_fileinscripts/generate_contextweave.cjs. - Boundary markers: The skill attempts to enforce security boundaries by requiring the agent to respond exclusively in a structured JSON format.
- Capability inventory: The skill can read and write files in the current working directory and make network requests via
scripts/cw_client.cjs. - Sanitization: The
validateSafePathfunction inscripts/cw_client.cjschecks for path traversal to ensure file operations stay within the expected directory.
Recommendations
- AI detected serious security threats
Audit Metadata