higgsfield-model-guide
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The instructions in
mnt/user-data/outputs/higgsfield/skills/higgsfield-recall/SKILL.mdexplicitly direct the agent to perform actions 'SILENTLY' and 'don't announce it'. This pattern matches behavioral concealment, where an agent performs background processing (in this case, local database queries) without the user's knowledge. - [COMMAND_EXECUTION]: The skill uses the
bashtool to execute local Python scripts (higgsfield_memory.py,seedance_lint.py, andgenerate_user_guide.py). These scripts perform file operations, database queries, and PDF generation. - [COMMAND_EXECUTION]: A command injection surface exists in the
higgsfield-recallandhiggsfield-seedancesub-skills. The agent is instructed to run shell commands using strings extracted from user prompts as arguments (e.g.,python3 higgsfield_memory.py query-filter "<key terms from prompt>" 5). If the agent fails to sanitize these strings before passing them to the shell tool, a malicious user could execute arbitrary commands by including shell metacharacters in their prompt intent. - [COMMAND_EXECUTION]: The
higgsfield_memory.pyscript performs atomic file writes by creating.tmpfiles and replacing existing ones. While functional, it indicates significant local file system manipulation capability.
Audit Metadata