design-system-extractor
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill requires the agent to execute shell commands to install Python dependencies from a requirements file and to run the extraction scripts (
design_system_extractor.pyandextract_tokens.py) located in the tools directory.\n- [EXTERNAL_DOWNLOADS]: The Python scripts perform network requests to user-provided URLs to fetch HTML and CSS data. The main extractor script (design_system_extractor.py) explicitly disables SSL certificate verification (verify=False), which introduces a risk of man-in-the-middle (MITM) attacks during the data collection process.\n- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it processes content from external, untrusted websites.\n - Ingestion points: External website content is fetched by the
DesignSystemExtractorclass indesign_system_extractor.py.\n - Boundary markers: The skill uses a dedicated Python pre-processor to sanitize content before it is presented to the LLM, reducing the risk of the model directly interpreting malicious HTML/scripts.\n
- Capability inventory: The agent can perform network requests and write files (
design_pattern.html) based on the extracted data.\n - Sanitization: The
sanitize_htmlmethod removes potentially dangerous tags such as<script>,<svg>,<iframe>, and base64-encoded data, focusing only on structural elements and CSS classes.
Audit Metadata