article-batch-illustration
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The file
SKILL.mdcontains a hardcoded Gemini API key:AIzaSyDvvGGRbH4Os3Er0dYi0kE_AzE3_2b_Az8. Hardcoding sensitive credentials allows anyone with access to the skill code to impersonate the author and consume their API quota. - [COMMAND_EXECUTION] (HIGH): The skill instructs the agent to execute a Python script (
scripts/generate_image.py) via the shell using arguments (--promptand--output) that are dynamically constructed from the title and content of a user-provided article without any sanitization. - Evidence:
SKILL.mdPhase 2 section instructs the agent to run apython3command where the--outputpath and--promptstring include components like主题名(Theme Name) and段落名(Paragraph Name) extracted directly from the article Markdown. - Risk: A malicious user could provide an article with a title like
$(touch /tmp/exploit)or../../../../etc/passwdto perform command injection or path traversal. - [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection because it ingests and processes untrusted external Markdown data to drive its core logic and command parameters.
- Ingestion points: The entire Markdown body of the article provided by the user (as described in
SKILL.mdPhase 1). - Boundary markers: Absent. There are no instructions to the agent to distinguish between its own system instructions and the content of the article being processed.
- Capability inventory: Shell command execution via
subprocess(callingpython3 scripts/generate_image.py) and file system write operations within the script. - Sanitization: Absent. There is no logic provided to escape shell characters or validate that the generated file paths stay within the intended Obsidian directory.
Recommendations
- AI detected serious security threats
Audit Metadata