iotapi
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill accesses sensitive local files to manage authentication credentials. Specifically, the modules
scripts/batch_query.py,scripts/device_monitor.py, andscripts/iot_client.pycontain logic to read sensitive keys and secrets from the file path~/.config/iotapi/credentials.json. - [COMMAND_EXECUTION]: The documentation encourages behaviors that modify persistent system configuration files.
SKILL.mdinstructs the user to add export commands to shell profiles like~/.bashrcor~/.zshrcto persist environment variables across sessions. - [DATA_EXFILTRATION]: The skill is designed to transmit application credentials to a user-defined external destination. In
scripts/iotsdk_client.py, the client sends authentication payloads containingappIdandappSecretto a base URL provided via theIOT_BASE_URLenvironment variable. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection through its handling of external data. 1. Ingestion points: Data enters the agent context via API responses in
scripts/iotsdk_client.pyandscripts/iotsdk_device.py. 2. Boundary markers: No delimiters or instructions to ignore embedded commands are present in the processing of tool outputs. 3. Capability inventory: The skill can perform network operations via therequestslibrary and write to the local file system usingscripts/batch_query.py. 4. Sanitization: There is no evidence of sanitization or filtering applied to content received from the IoT platform before it is handled by the agent. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
requestslibrary. This is a well-known package from the official Python Package Index used for standard HTTP operations and is documented accordingly.
Audit Metadata