meitu-image-face-swap
Pass
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script (
_shared/run_command.py) usingpython3. This script is used to invoke theimage-face-swapcommand with user-provided JSON input. This is a standard pattern for delegating tasks to internal platform tools. - [PROMPT_INJECTION]: The skill processes user-provided data including a
promptand two image URLs (head_image_url,sence_image_url), representing a potential surface for indirect prompt injection. - Ingestion points: Input parameters passed via
--input-jsoninSKILL.md. - Boundary markers: No explicit boundary markers or delimiters are defined in the execution string.
- Capability inventory: Subprocess execution of a local Python script.
- Sanitization: No sanitization logic is visible in the skill's instruction file.
- [DATA_EXFILTRATION]: No unauthorized network operations or access to sensitive local files were detected. The skill operates on image URLs as expected for its stated purpose.
Audit Metadata