mol-3d-viewer
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface when processing untrusted chemical data.\n
- Ingestion points: The
smilesandnameparameters inscripts/mol_3d_viewer.py, which accept input from user commands or external files.\n - Boundary markers: No delimiters or explicit safety instructions are used to isolate user-provided chemical data within the generated HTML report structure.\n
- Capability inventory: The skill generates
.htmlfiles (interactive viewers),.pngimages, and.sdfstructure files usingPath.write_textand standard file writing libraries.\n - Sanitization: User-provided input, such as the chemical name, is interpolated directly into the HTML template in the
generate_htmlmethod without escaping. This could allow for Cross-Site Scripting (XSS) if the generated file is opened in a browser after processing a specially crafted malicious name.\n- [EXTERNAL_DOWNLOADS]: Fetches chemical name-to-SMILES translations from the University of Cambridge's OPSIN service (opsin.ch.cam.ac.uk).\n- [EXTERNAL_DOWNLOADS]: The interactive HTML reports produced by the skill load the 3Dmol.js rendering library from a public CDN (3Dmol.org) to support WebGL visualization.
Audit Metadata