intercom-automation
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill has a significant attack surface for indirect prompt injection because it reads and processes data from external Intercom conversations and contacts.
- Ingestion points: Untrusted data enters the agent context via
INTERCOM_GET_CONVERSATION,INTERCOM_LIST_CONVERSATIONS, andINTERCOM_SEARCH_CONTACTS(as specified in SKILL.md). - Boundary markers: There are no specified delimiters or instructions to ignore embedded commands within the ingested data.
- Capability inventory: The agent has the ability to write back to the system via
INTERCOM_CREATE_CONVERSATION,INTERCOM_REPLY_TO_CONVERSATION, andINTERCOM_CLOSE_CONVERSATION. - Sanitization: No sanitization or filtering logic is defined to prevent the LLM from obeying instructions embedded in Intercom messages.
- [External Dependency] (LOW): The skill requires the configuration of an external MCP server at
https://rube.app/mcp. While this is the intended primary purpose of the skill, the domainrube.app(Composio) is not included in the pre-defined list of trusted organizations. The severity is downgraded to LOW per the primary purpose rule.
Audit Metadata