twilio-communications
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION] (MEDIUM): The skill is vulnerable to Indirect Prompt Injection because it processes external content (SMS bodies, IVR inputs) and possesses the capability to perform actions with side effects (sending messages, making calls). * Ingestion points: The
bodyparameter inTwilioSMS.send_smsandrequest.formin the Flask IVR routes. * Boundary markers: None are implemented to isolate untrusted data from the agent's instructions. * Capability inventory: Includesclient.messages.createfor SMS andresponse.dialfor voice redirection. * Sanitization: Validation is limited to phone number formatting; no sanitization is performed on message content. - [DATA_EXFILTRATION] (LOW): The skill implements outbound communication via the Twilio API. This provides a mechanism for an agent to transmit data to external recipients, which could be exploited for exfiltration if the agent is manipulated.
- [EXTERNAL_DOWNLOADS] (LOW): The code depends on the
twilioandflaskPython packages. These are trusted, industry-standard libraries, but they are external dependencies that should be version-controlled in production environments.
Audit Metadata