figma-to-design-audit
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests data from an external configuration file and processes it without adequate security boundaries. • Ingestion points: The file
.claude/design-tokens/design-tokens.jsonis read entirely into the agent's context (SKILL.md). • Boundary markers: Absent. The skill does not use delimiters or provide instructions to the agent to treat the JSON content as untrusted data or to ignore embedded instructions. • Capability inventory: The skill has access toBash,Read,Grep, andGlobtools, which could be leveraged if an attacker successfully injects instructions into the design tokens file. • Sanitization: Absent. There is no validation or escaping of the token names, color values, or library names before they are used in search patterns or logic.
Audit Metadata