kicad
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection. It ingests data from untrusted design files (.kicad_sch, .kicad_pcb, PDFs) and processes them into structured JSON. If an attacker embeds malicious instructions into component values or labels, the AI agent could be influenced to perform unintended actions when using the skill's capabilities, such as creating GitHub issues or making API requests.
- [COMMAND_EXECUTION]: The
export_issues.pyscript usessubprocess.runto call the GitHub CLI (gh) for issue creation and authentication status.what_if.pyalso usessubprocess.runto chain internal suite tools. These calls use list-based arguments, which is a safe practice that prevents shell injection. - [EXTERNAL_DOWNLOADS]: The
lifecycle_audit.pyscript makes outbound network connections to well-known electronics distributor APIs (DigiKey, Mouser, LCSC, and element14) usingurllib.request.urlopen. These connections are used to fetch component lifecycle and technical data based on Manufacturer Part Numbers (MPNs) extracted from the design.
Audit Metadata