community-signals
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches data from Hacker News via the Algolia API (hn.algolia.com) and Reddit via the Apify API or a vendor-provided proxy (api.gooseworks.ai). This is a core part of its lead extraction functionality.\n- [COMMAND_EXECUTION]: Executes a local Python script,
scripts/community_signals.py, to perform the web requests and process the results into CSV files.\n- [CREDENTIALS_UNSAFE]: It searches forAPIFY_API_TOKENorGOOSEWORKS_API_KEYin environment variables and local.envfiles. This is consistent with standard practices for managing API credentials in developer tools.\n- [PROMPT_INJECTION]: The skill ingests untrusted content from public developer forums which is later analyzed by the agent, presenting a surface for indirect prompt injection.\n - Ingestion points: Public posts and comments from Hacker News and Reddit are saved to
community_signals_signals.csv(Phase 3).\n - Boundary markers: There are no specific delimiters or instructions provided to the agent to disregard potential instructions embedded in the forum data during the analysis phase (Phase 4).\n
- Capability inventory: The agent has access to
Bash,Write, andWebSearchtools, which could be targeted by sophisticated injections.\n - Sanitization: The script includes basic HTML cleaning for HN comments but does not filter for logical prompt injection patterns.
Audit Metadata