internal-comms
Pass
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists solely of .txt and .md files, which are descriptive and instructional in nature. No executable scripts (e.g., .sh, .py, .js) were found. This significantly reduces the attack surface for common threats.
- Prompt Injection: All markdown files were scanned for explicit prompt injection patterns (e.g., 'IMPORTANT: Ignore', 'You are now DAN'). No such patterns were detected. The instructions are detailed but aim to guide the AI's behavior within the skill's intended purpose, not to bypass safety mechanisms.
- Data Exfiltration: No commands like
curl,wget,cat,ssh, or references to sensitive file paths (e.g.,~/.aws/credentials) were found. The 'Tools Available' sections in the example files (e.g.,examples/3p-updates.md) refer to information sources (Slack, Google Drive, Email, Calendar) that the AI is expected to have internal access to, not commands for the agent to execute to exfiltrate data. Therefore, this does not constitute a data exfiltration finding within the skill's code. - Obfuscation: No Base64 encoding, zero-width characters, Unicode homoglyphs, or URL/hex/HTML encoding were found in any of the files.
- Unverifiable Dependencies: There are no
npm install,pip install,git clone, or other commands to fetch external code or packages. All referencedexamples/files are local and part of the skill package. - Privilege Escalation: No
sudo,chmod,doas, or attempts to modify system files were found. - Persistence Mechanisms: No modifications to shell configuration files (
.bashrc), cron jobs, or system service files were detected. - Metadata Poisoning: The
SKILL.mdmetadata fields (name,description,license) were checked and found to be benign, containing no malicious instructions. - Indirect Prompt Injection: While the skill is designed to process information from external sources (Slack, Google Drive, Email), making it inherently susceptible to indirect prompt injection if the content from those sources is malicious, this is a general risk for such skills and not a vulnerability introduced by the skill's own code. The skill itself does not contain malicious content that would trigger this.
- Time-Delayed / Conditional Attacks: No conditional logic based on dates, times, usage counts, or environment variables was found.
Given that the skill is purely instructional and contains no executable components or malicious patterns, it is deemed safe.
Audit Metadata