design-fast
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes local Python scripts located at
$HOME/.claude/skills/ui-ux-pro-max/scripts/search.pyto gather design intelligence. This is an intended functional capability of the skill to utilize a design database.- [PROMPT_INJECTION]: The skill processes user-provided input through the$ARGUMENTSplaceholder, which is encapsulated within<tasks>delimiters. This untrusted data is then used by the agent to determine parameters for thepython3command execution. While the agent acts as a buffer by interpreting intent to fill placeholders like<product-type>, this structure represents a potential surface for indirect prompt injection if the inputs are designed to influence command parameters. No sanitization logic for these inputs is explicitly defined in the skill instructions.
Audit Metadata