renaissance-md-html
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The script
scripts/md_to_renaissance_html.mjsallows reading arbitrary files from the local filesystem. The--inputargument is passed directly tofs.readFileSyncwithout validation, allowing access to any file the agent has permissions to read. Additionally, the image embedding feature intoDataUrlusesfs.readFileSyncon paths extracted from Markdown image syntax. An attacker can exploit this by including sensitive paths (e.g.,) which the script will convert to Base64 and embed in the output HTML. - [EXTERNAL_DOWNLOADS]: The script performs unvalidated network requests to fetch images. The
fetch(imageUrl)call intoDataUrlwill attempt to download content from any URL provided in the Markdown. This can be used for Server-Side Request Forgery (SSRF) or to leak execution context to an external listener. - [PROMPT_INJECTION]: The skill processes untrusted Markdown data from external sources and possesses significant capabilities including file system access and network operations. It lacks boundary markers or sanitization for the Markdown content, creating an attack surface for indirect prompt injection where malicious instructions embedded in a processed document could influence the agent's behavior. Evidence includes ingestion via
stdinand the--inputflag inscripts/md_to_renaissance_html.mjswithout sufficient isolation between data and command context.
Recommendations
- AI detected serious security threats
Audit Metadata