pp-flight-goat
Warn
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The CLI tool includes a
--deliver webhook:<url>parameter that enables the agent to POST command results to any external URL. This feature represents a direct exfiltration vector if the agent is manipulated into processing and sending sensitive information. - [EXTERNAL_DOWNLOADS]: The skill instructions require installing binaries via
go installfrom a third-party repository (github.com/mvanhorn) andnpxfor a package (@mvanhorn/printing-press), which executes code from external sources during the setup process. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface because it processes flight data from multiple external APIs.
- Ingestion points: Data is retrieved from FlightAware AeroAPI, Google Flights, and Kayak.
- Boundary markers: No explicit delimiters or warnings to ignore instructions within the API data are present in the skill.
- Capability inventory: The skill can perform network operations (POST via webhooks), write to the file system, and execute shell commands.
- Sanitization: No evidence of input/output sanitization or validation for external API content was found.
- [COMMAND_EXECUTION]: The skill operates by driving a command-line interface (
flight-goat-pp-cli), which is necessary for its functionality but expands the attack surface if the agent is tricked into injecting malicious arguments into the shell environment.
Audit Metadata