This skill is highly vulnerable to command injection and
Claims to do
Prelude NIST CSF 2.0 Report Generator: You are an expert compliance analyst helping users build a comprehensive NIST Cybersecurity Framework 2.0 assessment report. You walk them through every subcategory of the framework, help them gather evidence, offer to pull data from their Prelude platform where applicable, and generate a professional branded PDF at the end.
Actually does
This skill uses various Prelude MCP tools (e.g., `get_account`, `scm_list_endpoints`, `get_activity`) to pull cybersecurity data from the user's Prelude platform. It collects manual input and third-party data from the user. Finally, it generates an HTML report and converts it to a PDF using `puppeteer`, `wkhtmltopdf`, or `weasyprint` by executing shell commands.
Shell command execution function detected
system (
The skill explicitly uses external binaries (`npx`, `node`, `wkhtmltopdf`, `python3`) to convert HTML reports to PDF. If the HTML content or file paths can be influenced by user input, this creates a direct command injection vulnerability, allowing arbitrary code execution on the host system.
npx --yes puppeteer browsers install chrome... node -e "..." wkhtmltopdf <html_file> <output.pdf> python3 -c "from weasyprint import HTML; HTML(filename='<html_file>').write_pdf('<output.pdf>')"The agent offers to fetch data via `curl` from user-provided API endpoints. This creates a direct command injection vulnerability, allowing an attacker to execute arbitrary shell commands or perform Server-Side Request Forgery (SSRF) by manipulating the URL or `curl` arguments.
API: 'If you have an API endpoint, I can fetch data via curl'
The agent offers to read and summarize data from a user-provided file path for CSV exports. This allows the agent to access and potentially exfiltrate arbitrary files from the system where the agent is running.
CSV export: 'Export from [tool] and share the file path — I'll read and summarize it'
The skill lists a tool named `partner_block` which suggests it can perform blocking actions. Without clear safeguards or explicit user confirmation, this tool could be abused to cause denial of service or unintended operational impact if triggered with malicious or incorrect parameters.
| Deploy detection | `partner_block` |
The agent is instructed to use Prelude tools like `get_activity` with views such as 'protected' and 'threats'. While this is part of the skill's legitimate function, it means the agent has access to potentially sensitive security activity data, raising a low risk of inadvertent exposure or mishandling during summarization or reporting.
`get_activity` with view="protected"
User-provided input (e.g., manual descriptions) is embedded into the HTML report, which is then rendered by Puppeteer. Without proper sanitization, this could lead to HTML/JavaScript injection, allowing malicious code to execute within the headless browser context, potentially accessing local files or making network requests.
await page.goto('file://<absolute_path_to_html>', {waitUntil: 'networkidle0'});[](https://mondoo.com/ai-agent-security/skills/github/preludeorg/prelude-claude-plugin/nist)<a href="https://mondoo.com/ai-agent-security/skills/github/preludeorg/prelude-claude-plugin/nist"><img src="https://mondoo.com/ai-agent-security/api/badge/github/preludeorg/prelude-claude-plugin/nist.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/preludeorg/prelude-claude-plugin/nist.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.