wow-digest
Warn
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses highly sensitive user data from the personal Vault directory (
~/Brains/brain/), specifically targetingMy Focus.md, recentDaily/*.mdnotes, andai-research/*.mdfiles. This personal content is then sent to an external LLM via thellmcommand-line tool for scoring and analysis. - [COMMAND_EXECUTION]: The skill uses
subprocess.runto interact with external CLI tools includinggws(to manage Gmail messages),tg.py(to fetch Telegram posts), andllm. These tools operate with significant permissions over the user's communication accounts. - [EXTERNAL_DOWNLOADS]: The skill depends on manually installed external components not managed by standard package managers, specifically the
gwsCLI and thetelegram-telethonscript library located in the user's home directory. - [PROMPT_INJECTION]: Untrusted content from external emails and Telegram messages is interpolated into a scoring prompt, creating an indirect prompt injection surface.
- Ingestion points: Untrusted data enters via
scripts/ingest.pyfrom Gmail and Telegram sources. - Boundary markers: The prompt template in
config/wow_prompt.txtlacks clear delimiters or protective instructions for the{candidates}data block. - Capability inventory: The system has capabilities for shell command execution (
subprocess.run) and local file modification (appending to daily notes). - Sanitization: There is no evidence of sanitization or filtering of external content before it is passed to the LLM.
Audit Metadata