hardware-solution

Pass

Audited by Gen Agent Trust Hub on May 10, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill performs shell execution of a provided Python script scripts/md_to_pdf.py. This script is used to consolidate project documentation into a formatted PDF. Analysis of the script source code shows it uses standard libraries (weasyprint, markdown) for document layout and does not contain malicious logic.
  • [EXTERNAL_DOWNLOADS]: The skill fetches technical documentation (datasheets in PDF format) and CAD footprints from industry-standard websites such as AllDatasheet, LCSC, and official component manufacturer domains. These downloads are essential for the hardware selection and design process.
  • [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection as it ingests untrusted data from external electronic component datasheets and processes them to generate hardware architecture reports.
  • Ingestion points: Data enters the agent context from external URLs during the datasheet and footprint download phases, and from user-provided project requirements in docs/hardware/01-requirements.md.
  • Boundary markers: The instructions do not define explicit boundary markers or "ignore" directives for the downloaded content.
  • Capability inventory: The skill has the capability to execute a local Python script and perform network requests for file downloads.
  • Sanitization: There is no explicit sanitization or validation logic described for the external PDF or CAD data before processing.
Audit Metadata
Risk Level
SAFE
Analyzed
May 10, 2026, 12:56 PM