inkscape
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the ingestion of untrusted SVG data.
- Ingestion points: Reads and parses external SVG files via
lxml.etree.parseand Inkscape CLI commands inSKILL.md. - Boundary markers: Absent; the agent processes file content without delimiters or instructions to ignore embedded instructions within the XML/SVG structure.
- Capability inventory: Provides extensive capabilities including file system modification (
os.makedirs,open,tree.write), file deletion (rm), and command execution viasubprocess.runand Bash scripts. - Sanitization: Only basic character replacement (spaces and slashes) is performed on object labels before using them as filenames in the
batch_export.pyscript. - [COMMAND_EXECUTION]: The skill automates graphics workflows by executing system commands such as
inkscape,cwebp, andrmthrough Python'ssubprocessmodule and Bash scripts. The implementation generally uses safe patterns, such as list-based arguments in Python and variable quoting in shell scripts, to mitigate common command injection risks. - [EXTERNAL_DOWNLOADS]: The
optimize-svgs.shscript utilizesnpx svgoin its pipeline.npxis a well-known package runner that may dynamically download thesvgopackage from the npm registry if it is not already present in the user's environment.
Audit Metadata