xfive-figma-to-wordpress
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses WP-CLI and the Xfive MCP server to implement WordPress content and components, involving administrative actions within the WordPress environment.
- [EXTERNAL_DOWNLOADS]: Downloads images and icons from Figma's well-known service to a local temporary directory (
/tmp/figma_assets_...) for use in the WordPress site. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted design data from Figma URLs to determine implementation steps and code generation.
- Ingestion points: Figma design frames and component data accessed via URL or API (SKILL.md).
- Boundary markers: None specified; there are no clear delimiters to separate design content from instructions.
- Capability inventory: Includes writing files (SCSS, JS, PHP), modifying theme configuration (
theme.json), executing CLI commands, and invoking secondary skills for block development (references/ITERATION.md). - Sanitization: No validation or sanitization of the Figma design content is described before it is used to generate code.
Audit Metadata