aws-wechat-article-writing
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill reads the
WRITING_MODEL_API_KEYfrom theaws.envfile and transmits it via theAuthorizationheader to an external URL configured by the user in.aws-article/config.yaml. It also sends article drafts and reference materials to this endpoint. This behavior is clearly disclosed in the skill documentation as its primary function for calling external LLMs.- [COMMAND_EXECUTION]: The skill executes a local Python scriptscripts/write.pyto handle the logic of prompt construction and API interaction. This script is part of the skill package and does not execute arbitrary or untrusted remote code.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it ingests untrusted data fromtopic-card.mdand various reference files, which are then interpolated into system prompts sent to an LLM. While it uses headers to organize the prompt, it lacks strict boundary markers or sanitization to prevent embedded instructions in those files from influencing the model's behavior. This is a common architectural risk in LLM-based writing tools.
Audit Metadata