agentos-api-traces
Pass
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface by retrieving and displaying execution traces from an external API.
- Ingestion points: The CLI script
scripts/view_traces.pyfetches trace data from the/tracesand/traces/{trace_id}endpoints. - Boundary markers: Data from traces (such as user inputs) is displayed to the user without explicit isolation delimiters or safety warnings.
- Capability inventory: The skill utilizes the
AgentOSClientwhich is capable of network operations and managing agent executions. - Sanitization: No sanitization is applied to the trace data before it is rendered.
- [DATA_EXFILTRATION]: The skill facilitates the retrieval of execution traces that may contain sensitive data such as model inputs, outputs, and tool call arguments from past sessions. This is a standard feature for tracing and observability.
- [COMMAND_EXECUTION]: The provided Python script performs network requests to an AgentOS server at a user-defined URL to fetch observability data.
Audit Metadata