xfive-figma-to-wordpress

Pass

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses WP-CLI and the Xfive MCP server to implement WordPress content and components, involving administrative actions within the WordPress environment.
  • [EXTERNAL_DOWNLOADS]: Downloads images and icons from Figma's well-known service to a local temporary directory (/tmp/figma_assets_...) for use in the WordPress site.
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted design data from Figma URLs to determine implementation steps and code generation.
  • Ingestion points: Figma design frames and component data accessed via URL or API (SKILL.md).
  • Boundary markers: None specified; there are no clear delimiters to separate design content from instructions.
  • Capability inventory: Includes writing files (SCSS, JS, PHP), modifying theme configuration (theme.json), executing CLI commands, and invoking secondary skills for block development (references/ITERATION.md).
  • Sanitization: No validation or sanitization of the Figma design content is described before it is used to generate code.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 1, 2026, 08:19 AM