job-posting-intent
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill utilizes the
RUBE_REMOTE_WORKBENCHtool to run dynamically generated Python code in a remote execution environment. This code handles spreadsheet creation and formatting via the Google Sheets API. - [COMMAND_EXECUTION]: The skill executes local Python scripts (
search_jobs.py,create_sheet_mcp.py) that manage the scraping workflow, data qualification, and communication with external APIs. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to the processing of external data from job postings.
- Ingestion points: Job titles, descriptions, and company details are scraped from LinkedIn using the Apify API in
scripts/search_jobs.py. - Boundary markers: No delimiters or instructions are employed to distinguish external data from the agent's core instructions.
- Capability inventory: The skill has network access to Apify and Rube APIs and the ability to execute code remotely via the Rube workbench.
- Sanitization: Job description text is truncated but not sanitized for instruction-like patterns before processing.
- [EXTERNAL_DOWNLOADS]: The skill connects to
api.apify.comfor job data andrube.appfor its spreadsheet integration service. These are well-known services relevant to the skill's purpose.
Audit Metadata