workos-agent-access
Warn
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/issue-sealed-session.mjshandles sensitive credentials, including the WorkOS API key and user passwords, by passing them as a JSON string argument to a spawned Node.js process. This practice makes the secrets visible in the system's process table to other users or system monitoring tools. - [COMMAND_EXECUTION]: The script
scripts/issue-sealed-session.mjsemploys dynamic code execution by generating a JavaScript string at runtime and executing it via thenode -ecommand. - [EXTERNAL_DOWNLOADS]: The skill performs automated installation of the
@workos-inc/nodeSDK from the NPM registry during execution if it is not already present in the local directory. - [PROMPT_INJECTION]: The skill represents an indirect prompt injection surface as it ingests project configuration data from files like
convex.jsonto drive automation. 1. Ingestion points: Reads local configuration files as specified inplaybook.md. 2. Boundary markers: None. 3. Capability inventory: Subprocess execution and network requests inscripts/. 4. Sanitization: None.
Audit Metadata