ui-ux-pro-max
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
SKILL.mddirect the AI agent to execute shell commands with elevated privileges usingsudofor prerequisite installation. - Evidence:
sudo apt update && sudo apt install python3inSKILL.md. - [COMMAND_EXECUTION]: The Python script
scripts/design_system.pyimplements a file persistence feature that uses unsanitized user-provided strings to construct file paths, leading to potential path traversal. - Evidence: In
persist_design_system, thepageandproject_namevariables are used to create directories and files viaPathjoining without validating that the path remains within the intended workspace. This could allow an attacker to write or overwrite.mdfiles in sensitive locations. - [PROMPT_INJECTION]: The skill exposes an attack surface for indirect prompt injection by processing untrusted user queries and possessing file-writing capabilities without proper sanitization.
- Ingestion points: User-provided query strings in
scripts/search.py. - Boundary markers: Absent for user-supplied data used in file generation.
- Capability inventory: File system write access via the
persist_design_systemfunction inscripts/design_system.py. - Sanitization: Inadequate; the code only performs basic character replacement (spaces to hyphens) on user inputs before using them in path construction.
Recommendations
- AI detected serious security threats
Audit Metadata