postmark-automation
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- External Downloads (LOW): The skill requires connecting to an external MCP endpoint at https://rube.app/mcp. This domain is not on the trusted list. While it provides functionality, it introduces a dependency on a third-party service for authentication and data processing.
- Prompt Injection (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8). 1. Ingestion points: Data entering via POSTMARK_GET_TEMPLATE (template bodies) and POSTMARK_GET_BOUNCES (bounce details). 2. Boundary markers: Absent. No delimiters are used to separate untrusted data from instructions. 3. Capability inventory: High-impact capabilities including POSTMARK_SEND_BATCH_WITH_TEMPLATES, POSTMARK_EDIT_SERVER, and POSTMARK_EDIT_TEMPLATE. 4. Sanitization: Absent. There is no evidence of filtering or escaping external content before processing.
Audit Metadata