mmk-paymint-send
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection as it processes unvalidated user input to build command-line arguments.
- Ingestion points: The skill accepts external data for parameters such as
--phone,--name,--product, and--messagein themmk paymint sendcommand withinSKILL.md. - Boundary markers: There are no boundary markers or instructions to the agent to treat these inputs as non-executable data.
- Capability inventory: The skill is granted
Bash(mmk *)permissions, allowing it to execute local commands. - Sanitization: No sanitization or escaping of the input strings is performed before they are passed to the shell.
- [COMMAND_EXECUTION]: The skill utilizes the
mmkCLI tool, which is a vendor-specific resource associated with the author 'magic-meal-kits', to perform its primary function of sending invoices via the Paymint service.
Audit Metadata