gimp
Warn
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The MCP configuration in
SKILL.mdusesnpx -y @libreearth/gimp-mcpto fetch and run a package at runtime. This allows for the execution of unvetted code from an external source that is not on the trusted vendor list. - [COMMAND_EXECUTION]: Multiple examples, such as
batch-watermark-runner.pyand the Bash workflows, usesubprocess.runor direct shell execution with strings constructed via interpolation (e.g.,gimp -i -b "..."). If input variables likeinput_pathorwatermark_textcontain malicious shell metacharacters, it could lead to arbitrary command execution on the host system. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection by processing external data without boundary markers or sanitization.
- Ingestion points:
SKILL.mdprocesses untrusted data throughinput_pathvariables in scripts and aconfig.jsonfile loaded viajson.loadin the social media post generator. - Boundary markers: No delimiters or instructions to ignore embedded commands are present when processing external file paths or text content.
- Capability inventory: The skill possesses extensive capabilities including subprocess execution (
subprocess.run), file system modification (os.makedirs), and image-based file writes through the GIMP PDB API. - Sanitization: There is no evidence of escaping, validation, or filtering of external strings before they are used to build shell commands or filesystem paths.
Audit Metadata