stable-diffusion-xlGenerate images with SDXL models, LoRA support, and inpainting
No threats detected by VirusTotal scanners
Review tool descriptions for hidden instructions
Pin tool versions and review updates before upgrading
Apply principle of least privilege per tool
Requires API keys or tokens to function. If the tool is compromised, your API keys could be exfiltrated and used for unauthorized access or billing abuse.
Can make outbound network requests. A compromised tool can exfiltrate stolen data, download additional payloads, or communicate with command-and-control servers.
Can read and write files on your system. Malicious tools can steal SSH keys, credentials, browser data, or modify configuration files.
No reviews yet. Be the first to review!
fal-text-to-imageGenerate, remix, and edit images using fal.ai models
ffmpeg-video-editorGenerate FFmpeg commands from natural language descriptions
imagemagickComprehensive ImageMagick operations for image manipulation
elevenlabs-ttsText-to-speech with ElevenLabs voices and cloning