revenue-optimizer
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill instructs the agent to locate and inspect highly sensitive files and credentials to identify service usage for cost analysis.
- Evidence:
SKILL.mdcontains instructions to "Scan for these cost sources: .env, config/, secrets". - Evidence:
references/cost-analysis.mdprovides patterns for reading environment files and searching for credentials such asAPI_KEY,SECRET, andTOKEN. - [COMMAND_EXECUTION]: The skill recommends the use of shell commands to extract sensitive data directly from the project environment.
- Evidence:
references/cost-analysis.mdsuggests using the command:grep -r "API_KEY\|SECRET\|TOKEN" .env* config/to find secrets. - [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection because it processes untrusted codebase data without isolation or sanitization.
- Ingestion points: The agent is directed to scan routes, components, and database models for feature discovery as specified in
SKILL.md. - Boundary markers: None identified; the skill does not provide delimiters or instructions to treat scanned codebase content as data rather than instructions.
- Capability inventory: The agent has the ability to read arbitrary files and generate implementation code, such as the Stripe integration patterns found in
references/stripe.md. - Sanitization: Absent; there is no logic to validate or filter the content retrieved from project files during the discovery process.
Recommendations
- AI detected serious security threats
Audit Metadata