wilma
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes the
wilmaandwilmaibinaries via the shell wrapper script located atscripts/wilma-cli.shto retrieve student data. - [EXTERNAL_DOWNLOADS]: Installs the
@wilm-ai/wilma-clipackage from the npm registry and references external documentation ongithub.com/aikarjal/wilmaiand thewilm.aidomain. - [EXTERNAL_DOWNLOADS]: Includes a
wilma updatecommand that enables the CLI tool to fetch and apply updates from remote sources. - [CREDENTIALS_UNSAFE]: Accesses the sensitive configuration file
~/.config/wilmai/config.json(or$XDG_CONFIG_HOME/wilmai/config.json) which stores Wilma session credentials and TOTP secrets for student accounts. - [PROMPT_INJECTION]: Processes untrusted data from the Wilma school system which creates a risk for indirect prompt injection.
- Ingestion points: External content is ingested through commands like
wilma news list,wilma news read,wilma messages list, andwilma messages read. - Boundary markers: The skill instructions do not utilize boundary markers or explicit safety warnings to delineate ingested content.
- Capability inventory: The agent can execute shell commands using the
wilmabinary to interact with the environment. - Sanitization: There is no evidence of sanitization or filtering of the text content fetched from messages or news before processing.
Audit Metadata