mermaid-to-gif
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/mermaid_to_gif.pyexecutes theffmpegbinary to process images and generate GIFs. - Evidence:
subprocess.run()is used inassemble_gifwith arguments passed as a list, which is a safe practice to prevent shell injection. - [EXTERNAL_DOWNLOADS]: The skill fetches the Mermaid.js library from a public CDN at runtime.
- Evidence:
MERMAID_CDNpoints tocdn.jsdelivr.net, which is a well-known and commonly used service for hosting web libraries. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to how it handles external data.
- Ingestion points: Content is read from user-supplied
.mdand.mmdfiles inscripts/mermaid_to_gif.py. - Boundary markers: No specific delimiters or instructions are used to separate untrusted content from agent instructions.
- Capability inventory: The skill can execute shell commands (FFmpeg) and perform automated browser actions (Playwright).
- Sanitization: While HTML escaping is used, the Mermaid configuration uses
securityLevel: 'loose', which permits the execution of scripts embedded within the diagram code in the context of the rendering browser.
Audit Metadata