msw-painter
Warn
Audited by Gen Agent Trust Hub on May 15, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
puppeteerpackage from the npm registry vianpm installin thescripts/directory to enable image rendering capabilities. - [COMMAND_EXECUTION]: The skill uses
nodeto execute thescripts/render.cjsutility and instructs the agent to usecurlorInvoke-WebRequestto upload binary data to a presigned URL. - [COMMAND_EXECUTION]: In
scripts/render.cjs, the Puppeteer browser instance is launched with the--no-sandboxand--disable-setuid-sandboxflags. These settings disable essential security isolation features of the Chromium browser, potentially allowing code running inside the browser to escape and interact with the underlying host system. - [REMOTE_CODE_EXECUTION]: The
scripts/render.cjsscript performs dynamic execution by interpolating JavaScript code into an HTML template, which is then executed within the Puppeteer browser environment. This allows for the execution of arbitrary code logic generated during the sprite creation process. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it takes user requirements and translates them into executable code for rendering. Maliciously crafted user input could lead to the generation of code designed to exploit the un-sandboxed browser environment.
- Ingestion points: User requests for custom sprites or icons as described in
SKILL.md. - Boundary markers: Absent; there are no specific delimiters or instructions provided to the agent to treat user-provided descriptions as untrusted data when generating code.
- Capability inventory: The skill can execute arbitrary JavaScript in a headless browser via
scripts/render.cjs, write files to the disk viapage.screenshot, and perform network operations. - Sanitization: Absent; the agent is instructed to write and execute code based on user intent without filtering or validation of the resulting script content.
Audit Metadata