linkedin-cli
Pass
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Recommends the installation of the
@linkedapi/linkedin-clipackage from the public NPM registry and communicates with theapp.linkedapi.ioservice to perform LinkedIn automation. - [COMMAND_EXECUTION]: The skill's primary functionality is built around executing shell commands using the
linkedinCLI tool for profile fetching, messaging, and account management. - [CREDENTIALS_UNSAFE]: The setup process requires users to pass sensitive API and identification tokens as plain-text arguments to the
linkedin setupcommand. This can result in credentials being stored in the user's shell history (e.g.,~/.bash_history), which is a security risk. - [PROMPT_INJECTION]: The skill processes untrusted data from LinkedIn, including profiles, posts, and messages. This creates an attack surface for indirect prompt injection:
- Ingestion points: Content is retrieved via commands like
person fetch,message get, andpost fetchinSKILL.md. - Boundary markers: No delimiters or instructions are specified to prevent the agent from obeying instructions embedded in the retrieved data.
- Capability inventory: The skill has extensive command execution capabilities through the
linkedintool. - Sanitization: There is no mention of sanitizing or escaping the retrieved external content before it is processed by the agent.
Audit Metadata