ensembl-skill
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- File System Interaction: The
scripts/rest_request.pyscript includes a parameterraw_output_paththat allows the response from a network request to be written to any specified location on the local file system. - Evidence: The
_save_raw_outputfunction usespath.write_text()on a path derived directly from user-controllable input. - Risk: This capability could potentially be used to overwrite important configuration files or create new executable scripts if the agent is directed to process a malicious URL and save the output to a sensitive directory.
- General Network Connectivity: The skill is designed as a flexible HTTP client. While the instructions suggest using the Ensembl API, the underlying code in
scripts/rest_request.pydoes not restrict thebase_urlorpathto specific trusted domains. - Evidence: The
_build_urlfunction and therequests.Session().request()call utilize thebase_urlandpathinputs without validation against a whitelist. - Risk: This provides a surface for Server-Side Request Forgery (SSRF) or data exfiltration if the agent is instructed to send sensitive information (like headers or environment details) to an attacker-controlled endpoint.
- External Data Ingestion Surface: The skill is designed to fetch data from external web services and process it into summaries for the user.
- Evidence: The script fetches content from remote URLs and returns a
summaryorrecordsto the agent context via stdout. - Risk: This creates an indirect prompt injection surface where instructions hidden within the fetched API data could potentially influence the agent's future actions.
Audit Metadata