canvas-a2ui
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
canvas_imagetool inlib/canvas.jsperforms an unvalidated file read usingfs.readFilewith thesrcparameter. This allows the agent to access and encode sensitive files from the host system into the canvas workspace. - [DATA_EXFILTRATION]: The
canvas_screenshottool inlib/canvas.jsusesfs.writeFilewith an agent-suppliedoutputPathparameter. Without path validation or restriction, this enables the writing or overwriting of files anywhere on the file system the process has permission to access. - [REMOTE_CODE_EXECUTION]: The
canvas_evaltool executes arbitrary JavaScript viaeval()in the headless browser instance. This capability could be leveraged for unauthorized browser-based operations or to probe internal network resources. - [EXTERNAL_DOWNLOADS]: The skill fetches the Chart.js library from a well-known CDN (jsdelivr.net) in
lib/chart-renderer.jsto support its chart visualization features. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its architecture. Ingestion points:
canvas_draw,canvas_text, andcanvas_evaltools inindex.js. Boundary markers: No delimiters or instructions to ignore embedded commands are present. Capability inventory: JavaScriptevalinlib/canvas.js,fs.readFileinlib/canvas.js, andfs.writeFileinlib/canvas.js. Sanitization: No sanitization or validation of input data or code strings was identified in the implementation.
Recommendations
- AI detected serious security threats
Audit Metadata