temporal-cortex

Fail

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The npm package installation for @temporal-cortex/cortex-mcp includes a post-install script that downloads a pre-compiled executable binary from an external GitHub repository (https://github.com/temporal-cortex/mcp/releases/tag/mcp-v0.9.1) and executes it on the local system.
  • [CREDENTIALS_UNSAFE]: The skill accesses and manages sensitive OAuth credentials and configuration files located at ~/.config/temporal-cortex/credentials.json. Additionally, the metadata author 'temporal-cortex' does not match the provided author context 'billylui', which may indicate a source discrepancy.
  • [EXTERNAL_DOWNLOADS]: The skill fetches binary updates and checksums from GitHub and communicates with external APIs at api.temporal-cortex.com and various third-party calendar providers (Google, Microsoft, CalDAV).
  • [COMMAND_EXECUTION]: The skill uses npx to execute third-party code and provides instructions for running the service within Docker containers with host filesystem volume mounts.
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection from external data. 1. Ingestion points: The list_events tool reads event summaries and descriptions from external calendars. 2. Boundary markers: None identified in the provided skill logic. 3. Capability inventory: Includes the book_slot and request_booking tools which have network and write permissions. 4. Sanitization: The documentation claims an internal firewall exists within the binary to sanitize content, but this claim cannot be independently verified from the skill source.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 14, 2026, 04:17 PM