Plotting SOP
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of
system.runto execute shell commands for dependency checking, package installation, and rendering. It interpolates user-provided variables such as{topic}and{description}into shell command strings and file paths (e.g.,ls -la outputs/figures/{topic}-fig{N}.png) without explicit sanitization, creating a surface for command injection. - [DYNAMIC_EXECUTION]: The skill generates Python and Mermaid scripts at runtime and executes them via the system shell. The 'ReAct' self-correction loop allows the agent to modify and re-execute failing code up to three times, which can lead to unpredictable execution flows if the agent attempts to resolve errors by adding more complex or potentially unsafe code.
- [EXTERNAL_DOWNLOADS]: The skill automatically attempts to install Python packages using
pip installand executes remote Node.js packages usingnpx --yes @mermaid-js/mermaid-cli. While these target well-known registries, the use of--yesbypasses user confirmation for downloading and running remote code. - [CREDENTIALS_UNSAFE]: The instructions suggest storing the OpenRouter API key in
MEMORY.mdif the user provides one. Storing secrets in plain text in memory or shared workspace files increases the risk of credential theft if other skills or processes gain access to that file. - [DATA_EXFILTRATION]: The AI Image engine (§6) sends user-provided descriptions to an external endpoint (
https://openrouter.ai/api/v1/chat/completions) via a Python script. While OpenRouter is a known service, the pattern of taking local data and sending it to a remote API with an associated secret is a primary mechanism for data exfiltration.
Audit Metadata