person-intelligence-osint
Fail
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
================================================================================
🔴 VERDICT: HIGH
This skill presents a HIGH risk primarily due to its susceptibility to prompt injection and its design to process and synthesize untrusted external content. The direct embedding of user input into search queries and the subsequent processing of arbitrary web content create significant attack vectors.
Total Findings: 3
🔴 HIGH Findings: • Prompt Injection
- SKILL.md: The skill directly embeds user-provided inputs (
person_name,job_title,company_name) intosearchtool queries (e.g.,"{{person_name}}" "{{company_name}}" site:linkedin.com). This is a direct prompt injection vector, allowing an attacker to craft malicious inputs to manipulate thesearchtool's behavior or subsequent LLM processing. Additionally, the skill synthesizes content from arbitrary external websites into a final dossier. If this external content contains malicious instructions, it poses a significant indirect prompt injection risk when the dossier is later processed by an LLM.
🟡 MEDIUM Findings: • Arbitrary Web Content Browsing
- SKILL.md: In Step 4, the skill uses
browser_navigateto visit arbitrary URLs identified by thesearchtool (e.g., news articles, social media profiles). Browsing untrusted external websites carries inherent risks, such as exposure to malicious web content, potential drive-by downloads, or other web-based attacks if the browser tool has vulnerabilities. This is categorized as 'EXTERNAL_DOWNLOADS' due to fetching content from unverified external sources.
🔵 LOW Findings: • Access to Sensitive User Data
- SKILL.md: In Step 6, the skill conditionally uses
gmail_search_messagesandslack_search_public_and_privateto search for correspondence or mentions of the subject. While this functionality is explicitly stated and conditional on user integration, it involves accessing potentially sensitive private user data. Although the data is intended for the user and not directly exfiltrated to an external attacker, it represents a high-privilege operation that could be misused if the skill itself were compromised.
================================================================================
Recommendations
- AI detected serious security threats
Audit Metadata