slack
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill initiates external downloads to set up its environment, specifically using
npmto installplaywright-chromiumandnpxto download the Chromium browser binary. It also employsuvxto fetch and execute thepycookiecheatpackage at runtime for token extraction. - [DATA_EXFILTRATION]: The
slack-token-refresh.shscript accesses sensitive local information by usinglsofto find and read the Google ChromeCookiesdatabase. Additionally, it uses AppleScript to peek into open browser tabs and extractlocalStoragedata (including authentication tokens) fromapp.slack.comsessions. - [REMOTE_CODE_EXECUTION]: The
playwright-bridge.jsscript provides an execution surface viapage.evaluate(), allowing the agent to run arbitrary JavaScript in a browser context. Theslack-api.shscript dynamically constructs these JavaScript strings using shell variable interpolation, which creates a significant dynamic code execution path. - [COMMAND_EXECUTION]: The skill uses several bash scripts to perform system-level tasks, such as managing session files in
~/.agents/config/slack, executingosascriptfor browser interaction, and usingcurlto transmit data to Slack's API endpoints. - [PROMPT_INJECTION]: The skill is designed to retrieve and process untrusted data from Slack messages, threads, and search results. It lacks explicit boundary markers or sanitization logic to prevent the agent from inadvertently executing instructions that might be embedded within Slack message content.
Audit Metadata