resend
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill utilizes
npxto fetch and execute theresend-mcppackage from the npm registry. This is the standard method for running the Resend MCP server. - [DATA_EXFILTRATION]: The
send_emailandbatch_send_emailstools include an attachments feature that can read from a local filepath. This capability allows the agent to send local file content to external recipients through the Resend API. This is an intended functionality but presents a surface for data exfiltration if the agent is misdirected. - [PROMPT_INJECTION]: The skill processes external data for email bodies and subjects, which introduces a risk of indirect prompt injection.
- Ingestion points: The
from,to,subject, andbodyfields in thesend_emailandbatch_send_emailsoperations (SKILL.md). - Boundary markers: No specific delimiters or safety instructions are defined to separate untrusted content from agent instructions.
- Capability inventory: File system access via the
pathparameter for attachments and network communication via the Resend API. - Sanitization: No explicit sanitization or validation of the email content is mentioned in the skill definition.
Audit Metadata