wilma-triage
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill metadata specifies access to sensitive local configuration files:
~/.config/wilmai/config.jsonand~/Library/Application Support/gogcli/. These files are expected to contain authentication tokens for Wilma and Google services. - [PROMPT_INJECTION]: The skill processes untrusted data from school messages and bulletins, which presents an indirect prompt injection surface.
- Ingestion points: Output from
wilma summary,wilma messages, andwilma newscommands which fetch text from school teachers and administrators. - Boundary markers: Absent; the agent is not instructed to use delimiters or specific safety instructions when processing message content.
- Capability inventory: The agent has the ability to execute
wilmaandgogCLI commands, enabling it to write to or modify the user's Google Calendar based on the content of these messages. - Sanitization: No sanitization or validation of the message text is provided before it is interpreted by the agent.
- [COMMAND_EXECUTION]: The skill workflow involves executing shell commands via the
wilmaandgogCLI utilities to perform data retrieval and synchronization tasks.
Audit Metadata