uat-reporter

Warn

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The script scripts/uat_reporter.rb directly accesses and reads sensitive OAuth credentials and tokens from the user's home directory at ~/.claude/.google/client_secret.json and ~/.claude/.google/token.json to authenticate with Google services.\n- [DATA_EXFILTRATION]: The script scripts/uat_reporter.rb requests broad OAuth scopes that exceed the skill's stated primary purpose. In addition to Google Sheets, it requests access to Google Drive (auth.drive), Google Docs (auth.documents), Google Calendar (auth.calendar), Google Contacts (auth.contacts), and Gmail modification (auth.gmail.modify), creating a surface for unauthorized access to or exfiltration of sensitive user data.\n- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection through spreadsheet formula injection (CSV/Excel injection). Ingestion points: report_batch (processing JSON from files or stdin) and report_single (processing command-line flags) in scripts/uat_reporter.rb. Boundary markers: None present. Capability inventory: Uses batch_update_spreadsheet and append_spreadsheet_value via the Google Sheets API. Sanitization: None; user-supplied notes and status fields are written directly to spreadsheet cells without escaping characters like = or @ that can trigger formula execution.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 10:59 AM