slide-creator
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is susceptible to Indirect Prompt Injection, where malicious instructions in source material could hijack the image generation process.
- Ingestion points:
scripts/create_slides.pyreads user-provided text through theload_promptsandoutline_to_promptsfunctions. - Boundary markers: Absent. The skill uses simple f-strings to build prompts, providing no separation between system instructions and untrusted data.
- Capability inventory:
subprocess.runis used to execute external Python scripts from thenano-bananaskill. - Sanitization: Absent. No escaping, validation, or filtering is performed on input text before it is passed as a command-line argument.
- [COMMAND_EXECUTION] (MEDIUM): The script executes local files via
subprocess.runusing paths constructed from the user's home directory. - Evidence:
scripts/create_slides.pytargets~/.claude/skills/nano-banana/scripts/generate_image.pyusingPath.home(). - Risk: While using an argument list prevents direct shell injection, the skill relies on the presence and security of scripts outside of its own package.
Recommendations
- AI detected serious security threats
Audit Metadata