image-edit
Pass
Audited by Gen Agent Trust Hub on May 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
runcomfyCLI to execute image manipulation tasks locally. User-provided prompts are passed to this tool as structured JSON data.\n- [EXTERNAL_DOWNLOADS]: Recommends installing the@runcomfy/clipackage, which is the utility provided by the skill's author for interacting with their models.\n- [CREDENTIALS_UNSAFE]: Refers to the use of an API token stored in~/.config/runcomfy/token.jsonor provided via theRUNCOMFY_TOKENenvironment variable for authentication.\n- [DATA_EXFILTRATION]: Performs network requests to theruncomfy.netandruncomfy.comdomains to submit tasks and download edited images.\n- [PROMPT_INJECTION]: Ingests user-supplied strings which are used as prompts for AI models, creating an indirect prompt injection attack surface.\n - Ingestion points: User-provided strings in the
promptfield across multiple model routes inSKILL.md.\n - Boundary markers: Prompts are encapsulated within JSON objects passed via the
--inputCLI flag.\n - Capability inventory: Execution of shell commands using the
runcomfy runcommand as specified inSKILL.md.\n - Sanitization: Documentation specifies that the CLI transmits JSON content directly without shell expansion of the prompt text.
Audit Metadata