extension-email-verification
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Potential indirect injection surface identified in
src/backend/main.mo. The skill processes untrusted user input that is then used in a functional context. - Ingestion points: The
registerUserfunction insrc/backend/main.moingests user-providednameandemailstrings. - Boundary markers: Absent. The skill does not use delimiters or instructions to treat the user-provided name as data rather than code or formatting.
- Capability inventory: The skill uses
EmailClient.sendVerificationEmailto send messages over the network. - Sanitization: Absent. The user's
nameis concatenated directly into the HTML body of the verification email, allowing for potential HTML injection if the input contains malicious tags. - [EXTERNAL_DOWNLOADS]: Fetches and utilizes external Motoko modules
caffeineai-email-verificationandcaffeineai-emailvia themopspackage manager. These are standard dependencies provided by the author.
Audit Metadata