funding-signal-monitor
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches funding announcement data from the Hacker News Algolia API (https://hn.algolia.com/api/v1), a well-known service for accessing public data.
- [COMMAND_EXECUTION]: Executes helper Python scripts (e.g., scripts/search_funding.py) and external scrapers for Twitter and Reddit to aggregate and process funding signals.
- [PROMPT_INJECTION]: The skill processes untrusted data from public forums and social media, creating a surface for indirect prompt injection. Maliciously crafted funding announcements could contain instructions designed to influence the agent's behavior during the lead qualification or outreach generation phases.
- Ingestion points: Data retrieved from HN API, Apify scrapers, and WebSearch tool as documented in SKILL.md and scripts/search_funding.py.
- Boundary markers: No explicit delimiters or instructions are used to distinguish untrusted web content from system instructions during processing.
- Capability inventory: The skill chains to company-contact-finder and setup-outreach-campaign, providing a vector for malicious input to affect downstream automated actions.
- Sanitization: No evidence of sanitization, filtering, or validation of the ingested announcement text to prevent the execution of embedded instructions.
Audit Metadata