email-service-integration
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The
send_notification_emailfunction inSKILL.md.originalandreferences/pythonflask-with-smtp.mdutilizes the|safefilter within a Jinja2 template. This filter explicitly disables HTML escaping for thehtml_contentfield. If this field processes data from an untrusted source, it facilitates HTML injection or phishing attacks within the emails sent by the agent. - Ingestion points: The
notification_dataobject inSKILL.md.originalandreferences/pythonflask-with-smtp.md. - Boundary markers: None present; the skill lacks delimiters or instructions to ignore instructions embedded in the data.
- Capability inventory: The skill includes functionality to send emails via SMTP and third-party providers (SendGrid).
- Sanitization: Sanitization is explicitly bypassed for the
contentvariable. - [PROMPT_INJECTION]: The use of
render_template_stringwith user-controlled variables such astitleandmessageinSKILL.md.originalcreates a surface for Indirect Prompt Injection and Server-Side Template Injection (SSTI). If an attacker provides Jinja2 syntax as input for these fields, it could lead to the leakage of sensitive application configuration data when the email is rendered. - [EXTERNAL_DOWNLOADS]: The skill requires several standard third-party libraries, including
flask-mail,flask,mjml,fastapi-mail,email-validator, anddnspythonfor Python, as well as@sendgrid/mailandexpressfor Node.js. These are well-known packages used for email handling and web services.
Audit Metadata