fal-vision
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/analyze.shexecutes shell commands, specificallycurlandjq, to interact with the fal.ai API. It manages sensitive configuration by sourcing.envfiles and providing a helper flag--add-fal-keyto write theFAL_KEYto a local.envfile. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8).
- Ingestion points: Untrusted data enters the agent context through the
--image-urland--queryarguments inscripts/analyze.sh. - Boundary markers: None are present; the inputs are directly interpolated into the JSON payload sent to the remote API.
- Capability inventory: The script performs network operations (
curl) and local file writes (writing to.envvia--add-fal-key). - Sanitization: There is no validation or sanitization of the
IMAGE_URLorQUERYvariables before they are used in thecurlcommand's JSON payload, which could lead to malformed JSON or unexpected API behavior if the input contains quotes or control characters.
Audit Metadata