Architecture Research

PassAudited by VirusTotal on May 11, 2026.

Findings (1)

The skill is designed to research codebases and generate diagrams, which requires extensive file system access (cloning repos, writing output) and network access (web searches). The primary reason for 'suspicious' classification is the explicit instruction in `SKILL.md` for the AI agent to execute shell commands using `node <diagrams-skill-dir>/scripts/render-elk.mjs`. While these commands are for a stated, seemingly benign purpose (rendering diagrams via a dependency skill), direct shell execution capabilities introduce a significant attack surface for potential Remote Code Execution (RCE) if the `render-elk.mjs` script or its inputs (ELK JSON generated by the agent) were exploitable, or if the `<diagrams-skill-dir>` path could be manipulated. There is no evidence of intentional malicious behavior like data exfiltration or persistence within this skill's instructions, but the direct shell command execution capability elevates it beyond benign.