page-mockup-builder
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Starts a temporary local HTTP server using
python3 -m http.server 8080to facilitate the transfer of generated HTML mockups to Figma's design capture tool. - [EXTERNAL_DOWNLOADS]: Interacts with Figma's official remote MCP endpoint at
https://mcp.figma.com/mcpto synchronize design layers. Figma is a well-known and trusted design service. - [DATA_EXFILTRATION]: Processes user-provided Figma URLs and design metadata to inform the mockup generation. The skill does not access sensitive local configuration files, SSH keys, or environment variables.
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting and rendering content derived from untrusted user briefs and external Figma nodes.
- Ingestion points: User-provided page briefs (Step 1) and Figma design context (Step 2).
- Boundary markers: Uses specific brand guidelines and a retrieved 'No Fly List' to constrain output generation.
- Capability inventory: Performs file writes for HTML mockups and executes shell commands for local hosting (Step 5).
- Sanitization: Implements an explicit safety check against a dynamic 'No Fly List' to prevent unauthorized customer mentions in the output (Step 0).
Audit Metadata