image-gen
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is vulnerable to indirect prompt injection via the
--promptfilesargument, which allows reading content from local files. This untrusted data is interpolated into prompts sent to external AI APIs without sanitization or boundary markers.\n- Ingestion points: File content read via--promptfiles, reference images via--ref, and configuration overrides viaEXTEND.md.\n- Boundary markers: None present; content is likely processed as raw prompt text.\n- Capability inventory: Network access (OpenAI/Google APIs) and file system write access (--imageoutput).\n- Sanitization: No sanitization of ingested file content is mentioned.\n- [Command Execution] (MEDIUM): The skill executes local TypeScript scripts usingnpx -y bun. While Bun is a legitimate runtime, usingnpxwith the-yflag on potentially untrusted or dynamic paths can lead to unintended command execution if the environment is not strictly controlled.\n- [External Downloads] (LOW): The use ofnpx -ymay trigger automatic downloads of packages from the npm registry if the runtime or dependencies are not cached, representing an external dependency risk.\n- [Data Exposure] (MEDIUM): The skill loads sensitive configuration files and environment variables from the user's home directory (~/.content-gen-skills/). This allows a local attacker with limited privileges to poison the skill's behavior or intercept API keys by placing malicious files in the home directory.
Recommendations
- AI detected serious security threats
Audit Metadata