flomo-web-crud
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes instructions for the agent to generate and execute JavaScript code snippets in the browser's context to interact with internal application states (Vue.js and Tiptap editor). This is used as a fallback mechanism for UI automation.\n
- Evidence:
references/ui-locators.mdcontains snippets such asdocument.querySelector('.input-box').__vue__.onSubmit()andeditor.commands.setContent(...).\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by reading and summarizing user-generated memo content from the web interface while maintaining write and delete permissions.\n - Ingestion points: Memo data is ingested via
chrome_get_web_contentandchrome_read_pageas defined inreferences/workflows.md.\n - Boundary markers: There are no explicit instructions or delimiters to prevent the agent from following commands embedded within the fetched memo text.\n
- Capability inventory: The skill has tools for creating, editing, and deleting content on the flomo platform, as documented in
SKILL.mdandreferences/workflows.md.\n - Sanitization: There is no evidence of filtering or sanitizing the retrieved memo content to prevent adversarial instructions from influencing agent behavior.
Audit Metadata