Excalidraw Flowchart
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill requires the installation of a global npm package
@swiftlysingh/excalidraw-cliand frequently usesnpxto execute it. This package is hosted in an individual's namespace and is not part of the trusted organizations list, posing a supply chain risk. - REMOTE_CODE_EXECUTION (HIGH): The use of
npx @swiftlysingh/excalidraw-cliallows the execution of remote code every time the skill is triggered. If the package or the author's account were compromised, it would lead to direct command execution on the user's machine. - COMMAND_EXECUTION (MEDIUM): The skill constructs shell commands by interpolating DSL (Domain Specific Language) strings directly into
npxcalls. While the DSL is generated by the AI, it provides a vector for command injection if the AI is coerced into generating shell-sensitive characters in the--inlineargument. - DYNAMIC_EXECUTION (MEDIUM): The
export-png.jsscript dynamically generates a local HTML file (render.html) and executes it using Puppeteer with the--no-sandboxflag enabled. This pattern is often used to bypass browser security controls. - INDIRECT_PROMPT_INJECTION (MEDIUM): The
export-png.jsscript is vulnerable to XSS. It takes data from the.excalidrawfile (which contains user-provided text labels) and injects it into a<script>tag inrender.htmlusingJSON.stringify(). A label containing</script><script>...</script>would break out of the JSON context and execute arbitrary JavaScript in the Puppeteer browser instance, which hasfile://access to the local system.
Recommendations
- AI detected serious security threats
Audit Metadata