temp-email
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection.
- Ingestion points: The agent fetches email content (from, subject, body) via the
https://api.tempmail.lol/v2/inboxendpoint inSKILL.md. - Boundary markers: None. There are no instructions for the agent to treat the ingested email content as untrusted data or to ignore any commands contained within the email body.
- Capability inventory: The skill uses subprocess calls including
curl,jq, andgrepwithinSKILL.md. - Sanitization: None. The skill instructs the agent to parse the HTML body directly and extract links or codes, which may lead to the agent following malicious instructions embedded in an email.
- [COMMAND_EXECUTION]: The skill utilizes shell commands to perform its tasks.
- Execution of
curl,jq,grep,seq, andsleepis used to interact with the API, poll for messages, and parse data. - [EXTERNAL_DOWNLOADS]: The skill interacts with an external network service.
- It performs POST and GET requests to
https://api.tempmail.lolto manage temporary inboxes. This is the primary and expected function of the skill.
Audit Metadata