html-canvas
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted data from multiple sources (files, URLs, browser context, MCP queries) to populate generated HTML files (SKILL.md, step 6).
- Ingestion points: Data enters the agent's context through the
sourcesparameter and tools likeWebFetch(SKILL.md, step 6). - Boundary markers: The instructions do not mandate the use of delimiters or warnings to ignore instructions embedded in the ingested data.
- Capability inventory: The skill possesses the ability to write to the file system and execute shell commands via the
openutility (SKILL.md, step 12). - Sanitization: There is no requirement for the agent to sanitize, escape, or filter external content before interpolating it into the final HTML document.
- [COMMAND_EXECUTION]: The skill utilizes the shell command
open <output_path>to display the generated artifact to the user (SKILL.md, step 12). While this is intended behavior for opening the resulting HTML file in a browser, it involves executing a shell command with a parameter derived from user input.
Audit Metadata