baoyu-compress-image
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script uses
child_process.spawnto execute system binaries includingsips,cwebp, andconvert(ImageMagick). - Evidence: Found in
scripts/main.tswithinrunCmdandcommandExistsfunctions. - Risk: Relies on the security and presence of host-level binaries. While it avoids shell injection by using argument arrays, it still grants the agent the ability to invoke these tools on arbitrary paths provided by the user.
- [INDIRECT_PROMPT_INJECTION] (MEDIUM): The skill is susceptible to manipulation where an agent might be directed to 'compress' sensitive non-image files.
- Evidence:
unlinkSync(absInput)inprocessFile(scripts/main.ts) deletes the source file if the--keepflag is not set. - Capability: The skill has both read access to files and the ability to delete them.
- Risk: If the agent processes a sensitive file (e.g., an SSH key) thinking it is an image, and the compression tool produces any output or dummy file, the original sensitive file could be deleted.
- [EXTERNAL_DOWNLOADS] (LOW): The skill uses
npx -y bunand performs a dynamic import of thesharplibrary. - Evidence:
await import("sharp")incompressWithSharp(scripts/main.ts). - Risk: Fetches and executes code from the npm registry at runtime. While
sharpis a trusted package, dynamic dependency resolution introduces a minor risk of supply chain interference.
Audit Metadata