healthcare-monitor
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Multiple scripts, including
funding_detector.py,notifier.py, andmonitor.py, utilizesubprocess.runto interact with the host system. This is used to retrieve API credentials via thepassutility and execute local shell scripts for notifications. - [EXTERNAL_DOWNLOADS]: The monitoring logic performs network requests to various external sources. Scripts such as
funding_detector_v2.pyandscraper_free.pyfetch data from the Firecrawl API and scrape information from corporate and news platforms like Tianyancha, 36kr, and Sina Finance. - [PROMPT_INJECTION]: The skill exhibits an Indirect Prompt Injection surface through its data ingestion and analysis pipeline.
- Ingestion points: External news snippets and business change records collected by the scrapers are processed for analysis.
- Boundary markers: The
analyze_with_llmfunction inscripts/analyzer.pyinterpolates external content into a prompt without using explicit delimiters or instructions to ignore embedded commands. - Capability inventory: The skill has broad tool permissions, including
Bash,Exec, andBrowser, which increases the potential impact if a malicious injection is processed. - Sanitization: External content is not sanitized or escaped before being included in the prompt for LLM evaluation.
Audit Metadata