png-to-svg
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on the
scripts/png2svg.shscript, which executes system commands viamagickandpotrace. These tools are used to process image data provided by the user.- [COMMAND_EXECUTION]: The shell script usespython3 -cto perform text manipulation on SVG files. It interpolates shell variables directly into Python code strings (e.g.,with open('$out', 'r')). This represents a dynamic code execution risk; if a filename or output path contains a single quote, it could allow an attacker to execute arbitrary Python code.- [EXTERNAL_DOWNLOADS]: The skill instructions suggest installingimagemagickandpotracevia the Homebrew package manager. These are well-known and trusted utilities, but they constitute external binary dependencies required for the skill to function.
Audit Metadata