terminal-print
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to unsafe interpolation of untrusted data in
assets/print-terminal.shduring Markdown generation. - Ingestion points: Data is ingested from the system clipboard via
pbpasteor from local files viacatinassets/print-terminal.sh. - Boundary markers: The content is wrapped in triple backticks (```text), but these markers are not escaped, allowing an attacker to escape the code block if the input contains triple backticks.
- Capability inventory: The skill uses
Bashto write to temporary files and executespandoc,xelatex, andlpr. - Sanitization: While ANSI escape codes are stripped using
sed, there is no escaping of Markdown or LaTeX special characters, which could lead to LaTeX injection when Pandoc processes the file. - [DATA_EXFILTRATION]: The skill reads from the system clipboard and arbitrary user-specified files. This represents a risk of exposing sensitive information (e.g., passwords or tokens recently copied to the clipboard) if the content is printed to a network printer.
- [COMMAND_EXECUTION]: The skill executes various system commands and utilities, including
pandocfor document processing,xelatexfor PDF rendering, andlprfor communicating with the network printer.
Audit Metadata