job-posting-intent
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The scripts
scripts/create_sheet.py,scripts/create_sheet_mcp.py, andscripts/search_jobs.pycontain a hardcoded JWT token assigned to theRUBE_TOKENvariable. This token provides authentication for the Rube API and its presence in the code exposes the associated vendor account to potential misuse. - [REMOTE_CODE_EXECUTION]: The skill uses the
RUBE_REMOTE_WORKBENCHtool to execute Python code on a remote server. The code is constructed dynamically within the scripts using string interpolation of data retrieved from job searches. - Evidence found in
scripts/create_sheet_mcp.pyandscripts/search_jobs.pywhereworkbench_codeis defined and passed to the tool execution functions. - [EXTERNAL_DOWNLOADS]: The skill performs network requests to the Apify API (
api.apify.com) to retrieve job posting data from LinkedIn. - [DATA_EXFILTRATION]: Job-related data and company insights extracted by the skill are transmitted to the
rube.appservice via API calls to populate Google Sheets.
Recommendations
- AI detected serious security threats
Audit Metadata