Excalidraw Creator
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
The skill bundle is classified as suspicious due to a critical vulnerability. The `SKILL.md` workflow instructs the AI agent to save user-generated Excalidraw JSON to `/tmp/<name>.excalidraw` and then execute `node <skill_dir>/scripts/render.js /tmp/<name>.excalidraw /tmp/<name>.png`. If the `<name>` placeholder is derived directly from unsanitized user input, it creates a shell injection and path traversal vulnerability. An attacker could craft a malicious filename (e.g., `foo; rm -rf /; #` or `../../etc/passwd`) to execute arbitrary commands or read/write arbitrary files on the host system. While this is a severe vulnerability, there is no evidence of intentional malicious behavior (e.g., data exfiltration, backdoor installation) within the provided code or instructions. The `scripts/setup.sh` script downloads fonts from legitimate CDNs (cdn.jsdelivr.net, github.com) and the `scripts/render.js` script performs its stated function without additional risky operations.
