yqcloud-function-calling
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill specification defines
requestParserandresponseParserfields which are designed to contain JavaScript code strings. These strings are executed at runtime to transform data, representing a dynamic execution pattern. - [EXTERNAL_DOWNLOADS]: The functions
getCreateTicketParamJsonSchema,getAllServiceItem, andrequestUserSelectServiceItemare defined to perform HTTP requests to the YQCloud service URL (${STATIC#yqcloud_url}). These are documented as standard functional requirements for the ITSM integration. - [PROMPT_INJECTION]: The skill creates a surface for indirect prompt injection by ingesting and processing external data from service item catalogs and schemas which could potentially contain malicious instructions.
- Ingestion points: Data enters the agent context through the outputs of
getAllServiceItemandgetCreateTicketParamJsonSchema. - Boundary markers: The provided documentation does not specify the use of boundary markers or instructions to ignore embedded commands within the ingested data.
- Capability inventory: The skill has the capability to perform network requests (
call_url) and trigger thecreateTicketfunction. - Sanitization: While the
responseParserallows for data filtering usinglodash, there are no explicit sanitization protocols defined to prevent instruction injection from the external data sources.
Audit Metadata