sn-image-imitate
Warn
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Worker Agent workflow defined in
SKILL.mdbuilds shell command strings by interpolating variables like$TARGET_CONTENTand$LONG_CAPTION. For example, Step 0 usesecho "$TARGET_CONTENT" > "$TEMP_DIR/target-content.txt". If these variables contain shell metacharacters (such as backticks, semicolons, or pipes), an attacker could execute arbitrary commands in the agent's execution environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It processes untrusted data from the
reference_imageand user-specifiedtarget_content, then embeds this content into prompts for LLM and VLM calls without adequate protection. This could allow adversarial content within an image or the input text to override the skill's instructions. - Ingestion points:
reference_image(Step 1) andtarget_content(Step 0 and Step 2). - Boundary markers: None; the prompts rely on simple text labels (e.g., 'Target content:') which do not effectively isolate untrusted data from the instruction context.
- Capability inventory: The skill can perform local file writes, execute shell commands through the
sn_agent_runner.pyscript, and invoke text/image generation models. - Sanitization: No evidence of escaping or validation is present for inputs before they are used in command execution or prompt construction.
Audit Metadata