zul-writer
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/validate-zul.pyprogrammatically executes package installation commands (uv pip install lxmlorpip install lxml) to ensure its dependencies are met. This is a common automation pattern for developer tools.- [EXTERNAL_DOWNLOADS]: The validation scriptscripts/validate-zul.pyretrieves the ZUL XML Schema (XSD) from the official ZK Framework domain (http://www.zkoss.org/2005/zul/zul.xsd) and attempts to download the 'lxml' package from the standard Python package registry.- [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection through the processing of external user data. * Ingestion points: User-provided ZUL files and UI mockup images (mockups/screenshots) are read and analyzed by the agent as part of the primary workflow defined inSKILL.md. * Boundary markers: No specific delimiters or safety instructions are defined to separate user-provided data from agent instructions. * Capability inventory: The skill's scripts perform file system operations and execute shell commands (subprocess.run). * Sanitization: No sanitization or filtering logic is present to identify or neutralize potential instructions hidden within the data being processed.
Audit Metadata