slack-reminders
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/schedule-reminder.shutilizes standard system utilities includingdate,grep,cut,tr, andcurlto handle time parsing and API communication. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection via schema confusion during JSON construction.
- Ingestion points: The
MESSAGEandDATETIMEparameters inscripts/schedule-reminder.shingest data directly from the agent's context. - Boundary markers: No delimiters or boundary markers are used to isolate untrusted user data from the script's internal logic.
- Capability inventory: The script possesses the capability to perform network operations (
curl) and read specific environment variables from.envfiles. - Sanitization: The script performs no sanitization or escaping on the
$MESSAGEvariable. Double quotes provided in the message will break the JSON structure of the API request, allowing for potential manipulation of the Slack API call parameters.
Audit Metadata