brainstorming
Warn
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill ships with a custom Node.js server implementation (
scripts/server.cjs) that is executed on the user's machine. This server handles WebSocket protocol handshakes and serves dynamic HTML content. Executing non-trivial networking code shipped with a skill increases the overall attack surface. - [COMMAND_EXECUTION]: Shell scripts (
scripts/start-server.shandscripts/stop-server.sh) are provided to manage the lifecycle of the background Node.js process. These scripts utilize system commands likeps,kill, andnohupto manage process execution and monitoring. - [DATA_EXFILTRATION]: The Node.js server includes a
/files/endpoint that serves files from the session directory. The documentation (visual-companion.md) suggests binding the server to0.0.0.0for remote or containerized environments. This configuration would expose the served files and the interactive prototypes to any device on the same network. - [PROMPT_INJECTION]: The skill utilizes an indirect prompt injection surface by reading user-generated interaction data from a
.eventsfile and incorporating it into the agent's context. - Ingestion points: The agent is instructed to read structured interaction data from
$SCREEN_DIR/.eventsduring the brainstorm loop. - Boundary markers: No explicit delimiters or safety warnings are implemented for the data read from the events file.
- Capability inventory: The skill has the ability to execute shell scripts and perform file system operations (writing design specifications).
- Sanitization: While the Node.js server uses
path.basenameto prevent directory traversal for the file-serving endpoint, there is no evidence of sanitization for the event data being processed by the agent.
Audit Metadata