qwencloud-vision
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
gossamer.pyscript usessubprocess.runto execute a local version checking script (check_update.py) if it is found within the repository's skills directory. Additionally, the skill's instructions guide the agent to run commands for installing or updating related components only after receiving explicit user permission. - [EXTERNAL_DOWNLOADS]: The skill facilitates the installation of the
qwencloud-update-checksibling skill and other updates from the officialQwenCloud/qwencloud-airepository. These actions are triggered based on update signals but are designed to be confirmed by the user before execution. - [DATA_EXFILTRATION]: The skill transmits image and video data to the vendor's API endpoints at
dashscope-intl.aliyuncs.comto perform analysis. This is the primary function of the skill. The code includes dedicated logic inqwencloud_lib.pyto mask API keys in error messages and logs, ensuring credentials are not exposed during transit or in case of failure. - [PROMPT_INJECTION]: The skill processes external data (images and videos) which could serve as a vector for indirect prompt injection. It manages this risk by using structured JSON payloads for API communication rather than raw string interpolation.
- Ingestion points: Image and video file paths or URLs provided to
scripts/analyze.py,scripts/reason.py, andscripts/ocr.pyvia the--requestor--filearguments. - Boundary markers: The prompt and visual data are structured as specific fields within an OpenAI-compatible JSON message format.
- Capability inventory: The skill can execute local scripts via
gossamer.pyand perform network requests viaqwencloud_lib.py. - Sanitization: Input prompts are encapsulated within JSON structures, and local files are converted to Base64 or uploaded to secure temporary storage before processing.
Audit Metadata