skills/zenobi-us/dotfiles/openscad/Gen Agent Trust Hub

openscad

Warn

Audited by Gen Agent Trust Hub on Feb 23, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script tools/render-with-params.sh performs unsafe string interpolation when calling Python. The shell variable $PARAMS_FILE is embedded directly into the Python script string executed by python3 -c. A malicious filename containing single quotes and Python commands can trigger arbitrary code execution. \n
  • Evidence: tools/render-with-params.sh lines 50-63. Unlike other scripts in the skill (e.g., tools/extract-params.sh) that use sys.argv for safe argument passing, this script concatenates the variable into the command string.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the parsing of OpenSCAD files. Comments within .scad files are extracted and presented as parameter descriptions without sanitization or boundary markers.\n
  • Ingestion points: tools/extract-params.sh (lines 38-81) parses user-provided .scad files.\n
  • Boundary markers: Absent; parameter descriptions are extracted and printed directly to the console or included in JSON output.\n
  • Capability inventory: The skill can execute openscad for rendering and STL export, and run Python-based parsing logic via tools/render-with-params.sh and tools/extract-params.sh.\n
  • Sanitization: No escaping or validation is performed on the extracted comment strings before they are output.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 23, 2026, 09:11 PM