networkx
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The documentation in
references/io.mdillustrates the use ofpickle.load()andnx.read_gpickle()for saving and loading graph objects. Loading pickled data is a known security risk that can allow an attacker to execute arbitrary Python code by providing a specially crafted file. - [PROMPT_INJECTION]: The skill facilitates the ingestion of untrusted data, which presents a surface for indirect prompt injection attacks.
- Ingestion points:
references/io.mddescribes methods for reading graph data from various formats including GraphML, GML, JSON, CSV, and SQL databases. - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the documentation.
- Capability inventory: The skill uses
networkx,pandas, andnumpyfor data manipulation and analysis. - Sanitization: There is no evidence of input validation or content filtering for the data being read.
- [EXTERNAL_DOWNLOADS]:
SKILL.mdcontains instructions for installing thenetworkxpackage and its dependencies usingpip. This is standard practice for software development tools.
Audit Metadata