figma
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): Multiple scripts (
add_code_connect.sh,get_design_context.sh,get_screenshot.sh,get_variables.sh) construct a string formcporter callby interpolating shell variables like$SOURCE,$COMPONENT_NAME, and$NODE_IDdirectly into a double-quoted string. - Evidence: In
scripts/add_code_connect.sh, the linemise x node@20 -- mcporter call "figma-desktop.add_code_connect_map($PARAMS)"executes a string where$PARAMSis built from user-controlled inputs. A malicious string (e.g., containing"), some_other_command() //) could manipulate the intended logic or execute unintended functions within the mcporter context. - DATA_EXFILTRATION (MEDIUM): The script
scripts/get_screenshot.shallows the caller to specify an arbitrary output file path via the--outputparameter. - Evidence: The script executes
mise x node@20 -- mcporter call ... > "$OUTPUT_FILE"without validating that the path is within a safe directory. This can be exploited to overwrite sensitive user files like~/.bashrcor~/.ssh/authorized_keysif the agent is tricked via prompt injection. - INDIRECT_PROMPT_INJECTION (LOW): The skill processes data from Figma (node IDs, component names). Since these are interpolated into command strings, a malicious Figma design file containing specifically crafted node names could trigger the command injection vulnerabilities described above.
- EXTERNAL_DOWNLOADS (SAFE): The scripts use
miseto manage the Node.js environment, which is a standard and trustworthy tool-chain manager.
Audit Metadata