technical-svg-diagrams

Warn

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [Indirect Prompt Injection] (MEDIUM): The script scripts/create-html.ts performs raw injection of SVG content into an HTML template used for high-quality rendering.\n
  • Ingestion points: The script reads content from a file path provided via the --svg argument.\n
  • Boundary markers: None present; the SVG content is directly embedded into the HTML structure.\n
  • Capability inventory: The generated HTML is intended to be opened by agent-browser, a high-capability tool with network access and potential local file visibility.\n
  • Sanitization: No sanitization or validation of the SVG XML is performed, allowing <script> tags or malicious event handlers to persist in the output HTML.\n- [Command Execution] (LOW): The documentation in SKILL.md includes various shell command examples for image conversion and environment setup.\n
  • Evidence: Usage of uvx, convert (ImageMagick), and rsvg-convert is recommended for exporting diagrams.\n- [External Downloads] (LOW): The skill instructions recommend installing external dependencies from public registries and system package managers.\n
  • Evidence: Mentions of uvx --from cairosvg, brew install cairo, and apt install libcairo2-dev.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 12:49 PM