visual-mockup
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection via the diagram's metadata and labels. The script
interactive_mockup.pyperforms a simple string replacement to embed a JSON-encoded object into a<script>block in an HTML template. Becausejson.dumpsdoes not escape HTML tags like</script>, an attacker can provide a diagram description that breaks out of the script context and executes arbitrary JavaScript (XSS). - Ingestion points: Untrusted user data from the conversation (node names, labels, titles) is processed and written to
/tmp/layout.jsonin SKILL.md. - Boundary markers: Absent. The instructions do not define delimiters or provide warnings to the agent about ignoring embedded instructions in the data.
- Capability inventory: The skill uses
subprocess.run(['open', ...])ininteractive_mockup.pyand theopencommand inSKILL.mdto launch a browser. - Sanitization: The skill lacks sanitization of HTML-sensitive sequences within the JSON data injected into the HTML mockup.
- [COMMAND_EXECUTION]: The skill relies on executing system commands (
python3,open) and uses predictable temporary file paths such as/tmp/layout.json,/tmp/mockup.html, and/tmp/visual-mockup.png. Using fixed paths in shared directories is a security weakness that can lead to file manipulation or race conditions in multi-user environments.
Audit Metadata