show-gallery
Warn
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [DYNAMIC_EXECUTION]: The skill generates a local HTML file (
gallery.html) and instructs the agent to execute it using thepreview_startandpreview_evaltools. The generated code includes JavaScript that dynamically builds the user interface based on the contents of a local folder. - [INDIRECT_PROMPT_INJECTION]: The skill is vulnerable to exploitation via malicious local file names. The JavaScript in the
gallery.htmltemplate reads file names from the directory listing and injects them directly into the Document Object Model (DOM) usinginnerHTMLwithout sanitization. - Ingestion points: The
loadGalleryfunction inSKILL.mdusesfetch('./')to retrieve directory listings from the local filesystem. - Boundary markers: No boundary markers or instructions to ignore embedded content are present in the generated code.
- Capability inventory: The agent uses
preview_startto serve the folder,preview_evalto manipulate the session, andpreview_screenshotto capture the output, providing a path for an attacker to influence the agent's view or actions. - Sanitization: Sanitization is absent. While file extensions are checked via regex, the filenames themselves are not escaped before being rendered via
card.innerHTMLin therenderGridfunction. - [COMMAND_EXECUTION]: The skill invokes shell-adjacent platform tools (
preview_start,preview_eval) to host and interact with a web server pointing to arbitrary local directories. If the user is tricked into browsing a directory controlled by an attacker, the unsanitized execution environment could be compromised.
Audit Metadata