skills/lobehub/lobe-chat/desktop/Gen Agent Trust Hub

desktop

Pass

Audited by Gen Agent Trust Hub on Feb 22, 2026

Risk Level: SAFEPROMPT_INJECTION
Full Analysis
  • Indirect Prompt Injection (LOW): The implementation guide for 'local tools' in 'references/local-tools.md' describes a capability that allows file renaming. The provided code snippet is vulnerable to path traversal because it does not sanitize input parameters.
  • Ingestion points: 'oldPath' and 'newName' parameters in 'LocalFileCtr.ts'.
  • Boundary markers: No delimiters or safety warnings are included in the template.
  • Capability inventory: 'fs.rename' call in 'apps/desktop/src/main/controllers/LocalFileCtr.ts' provides file system write access.
  • Sanitization: Absent; the example directly uses 'path.join' on raw input parameters.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 22, 2026, 02:42 AM