meitu-image-face-swap

Pass

Audited by Gen Agent Trust Hub on Mar 23, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a local Python script (_shared/run_command.py) using python3. This script is used to invoke the image-face-swap command with user-provided JSON input. This is a standard pattern for delegating tasks to internal platform tools.
  • [PROMPT_INJECTION]: The skill processes user-provided data including a prompt and two image URLs (head_image_url, sence_image_url), representing a potential surface for indirect prompt injection.
  • Ingestion points: Input parameters passed via --input-json in SKILL.md.
  • Boundary markers: No explicit boundary markers or delimiters are defined in the execution string.
  • Capability inventory: Subprocess execution of a local Python script.
  • Sanitization: No sanitization logic is visible in the skill's instruction file.
  • [DATA_EXFILTRATION]: No unauthorized network operations or access to sensitive local files were detected. The skill operates on image URLs as expected for its stated purpose.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 23, 2026, 08:47 AM