ascii-table-renderer

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • Indirect Prompt Injection (INFO): The skill processes external data (headers and rows) provided via stdin, which represents a potential injection surface.
  • Ingestion points: Data enters the script scripts/render_table.py via sys.stdin.read() and is parsed by json.loads().
  • Boundary markers: No specific boundary markers or 'ignore' instructions are added to the table output, though the output is wrapped in a formatted ASCII table.
  • Capability inventory: The script's capabilities are limited to string formatting and stdout printing via print(). It contains no subprocess, file-write, or network operations.
  • Sanitization: Input values are sanitized via the _stringify function, which converts all input to strings and replaces nulls with hyphens.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 07:18 AM