textual-tui
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/dump_dom_and_bindings.pyandscripts/generate_pilot_tests.pyperform dynamic code loading and execution. They useimportlibandexec_moduleto load Python modules from computed paths within the project directory to inspect application classes and generate metadata for the agent. - [COMMAND_EXECUTION]: The validation script
scripts/self_check.pyexecutes shell commands viasubprocess.runto test the skill's internal scaffolding functionality. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes content from local project files that may contain instructions designed to influence agent behavior.
- Ingestion points: Python and TCSS files within the project root are read and processed by auditing scripts such as
scripts/inspect_textual_project.pyandscripts/audit_textual_project.py. - Boundary markers: Analyzed content is passed to the agent without explicit boundary markers or instructions to ignore embedded instructions.
- Capability inventory: The skill possesses the capability to write files to the local filesystem and execute local scripts.
- Sanitization: The skill uses
ast.parsefor structural code analysis but does not sanitize or escape the content of files before presentation to the agent.
Audit Metadata