page-visuals
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/providers/nano-banana.shscript executes shell commands defined in theNANO_BANANA_COMMANDenvironment variable. This allows any user or process capable of modifying environment variables to achieve arbitrary code execution on the host system. - [COMMAND_EXECUTION]: The
scripts/image-provider.shscript uses unsanitized command-line arguments, specifically--page-nameand--shot-id, to build file paths for writing output. This lack of validation enables path traversal, potentially allowing an attacker to write or overwrite files anywhere the agent has permissions. - [EXTERNAL_DOWNLOADS]: The
scripts/providers/bloom.shscript downloads files from remote URLs usingcurl. While these downloads are part of the intended functionality (fetching generated images from a well-known service), the vulnerability in path construction makes this an unsafe operation. - [COMMAND_EXECUTION]: The skill presents an indirect prompt injection surface as it ingests untrusted data via
--promptand--source-url(scripts/image-provider.sh) which is then used in subprocess calls without sanitization or boundary markers (Capability: bash/curl/python3 execution).
Recommendations
- AI detected serious security threats
Audit Metadata