figma-context-mcp-cached
Warn
Audited by Gen Agent Trust Hub on May 18, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill configuration instructs the user/agent to download and run the
@pactortester/figma-mcp-cachedpackage from the NPM registry usingnpx. - [REMOTE_CODE_EXECUTION]: The skill executes remote code from an unverifiable package (
@pactortester/figma-mcp-cached) at runtime when the MCP server is initialized. - [COMMAND_EXECUTION]: The
download_figma_imagestool provides a mechanism to write data to the local file system. It includes alocalPathargument that supports absolute paths, potentially allowing file writes outside of intended directories. - [PROMPT_INJECTION]: Indirect prompt injection surface exists in the Figma design data processing. The skill fetches design specifications (node names, component properties, styles) from external Figma URLs and encourages agents to use this data for code generation. A malicious design file could contain embedded instructions to influence the agent's output.
- Ingestion points: Figma API responses processed in
SKILL.md(e.g.,get_figma_dataoutput). - Boundary markers: None identified; design data is interpolated into logic for CSS/Tailwind generation.
- Capability inventory: File writing via
download_figma_imagesinSKILL.md. - Sanitization: No evidence of sanitization for Figma design tokens before processing.
Audit Metadata