matplotlib
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
emacsclientcommand to retrieve theme-specific foreground colors for use in the generated plots. - [REMOTE_CODE_EXECUTION]: It generates Python scripts based on data found in the interaction context and executes them using the
uvtool. - [EXTERNAL_DOWNLOADS]: The
uvrunner is instructed to fetch thematplotlibpackage from standard public registries as a runtime dependency. - [PROMPT_INJECTION]: The skill processes untrusted data from the conversation history and interpolates it into a Python script template, creating an indirect prompt injection surface.
- Ingestion points: Plottable data derived from the current interaction context as described in SKILL.md.
- Boundary markers: No explicit delimiters or instructions are provided to prevent embedded data from interfering with the script logic.
- Capability inventory: The skill has access to shell execution via the Bash tool, used for executing
emacsclientanduv run(SKILL.md). - Sanitization: The instructions do not specify any sanitization or validation of the input data before it is written to the Python script.
Audit Metadata