drawio-designer
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes a bash script
scripts/drawio-to-png.shthat executes shell commands to call external diagram conversion tools likedrawioordrawio-batch. While the script uses quoting for variables, it is a mechanism for executing shell commands based on provided file paths. - [PROMPT_INJECTION]: The skill is designed to ingest and manipulate external
.drawioXML files, which constitutes a surface for indirect prompt injection. - Ingestion points: Reads and edits
.drawioXML files (e.g., inSKILL.mdexamples). - Boundary markers: No explicit instructions are provided to the agent to treat XML content as untrusted data or to use delimiters to prevent instruction leakage.
- Capability inventory: The skill can execute shell scripts (
drawio-to-png.sh), Python scripts (find-arch-icon.py), and perform XML modifications. - Sanitization: There is no evidence of sanitization or structural validation performed on the XML content before the agent processes it.
Audit Metadata