omi-api-integration
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill handles untrusted external content (memories, transcripts) with high-impact capabilities.
- Ingestion points:
GET /v1/dev/user/memoriesandPOST /webhook/transcriptinSKILL.md. - Boundary markers: Absent; the instructions do not specify delimiters or instructions to ignore embedded commands in ingested content.
- Capability inventory:
edit_memory,delete_memory, andcreate_action_itemtools are defined for data modification. - Sanitization: Absent; no filtering of retrieved content is specified.
- Data Exposure (LOW): Makes network requests to
api.omi.me, which is not a whitelisted domain, though it is the intended service endpoint. - Credentials (INFO): Correctly uses placeholders like
omi_dev_your_key_hereinstead of exposing actual secrets.
Recommendations
- AI detected serious security threats
Audit Metadata