enrich-and-research
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on local bash scripts (
api.shandsignup.sh) to perform authenticated network requests and handle user registration. This architecture keeps sensitive operations outside of the primary instruction set and isolates the logic for environment variable management. - [DATA_EXFILTRATION]: Communication is directed to the
api.openfunnel.devdomain, which belongs to the skill's author. This is the expected behavior for a vendor-provided enrichment service and does not represent unauthorized exfiltration. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface in the 'Account Attack Strategy' generation phase. External data retrieved from the API (such as social media posts or company descriptions) is interpolated into a prompt template. While the risk is mitigated by the source of the data, the absence of explicit boundary markers or 'ignore' instructions for the embedded content represents a standard surface for indirect injection.
- [CREDENTIALS_UNSAFE]: The skill implements an OTP-based authentication flow that stores the resulting API key in a local
.envfile. The instructions explicitly prohibit the agent from reading this file directly, and thesignup.shscript automatically adds.envto.gitignoreto prevent accidental credential leakage. This is a recommended practice for secret management in this environment.
Audit Metadata