deepscan-record-list
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill reads an authentication token from the user's home directory.
- Evidence: The script
scripts/recordlist.pyopens and reads the file at~/.deepscan/token. - The token is used in the
Authorization: Bearerheader for requests tohttps://data.cli.im/x-deepscan, which is the official endpoint for the vendor's service. - [COMMAND_EXECUTION]: The skill relies on executing local Python scripts to interact with the service.
- Evidence:
SKILL.mdcontains instructions to executepython scripts/recordlist.pyandpython ../deepscan-task/scripts/task.py. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection via the data it retrieves from the external API.
- Ingestion points: Data is retrieved from the
recordsandsessionsfields of the JSON response fromhttps://data.cli.im/x-deepscan/api/records/getListByTaskIdinscripts/recordlist.py. - Boundary markers: The instructions do not specify any delimiters or warnings to the agent to ignore instructions embedded within the
scan_resultorsession_namefields. - Capability inventory: The skill has the capability to read files from the home directory and perform network operations.
- Sanitization: There is no evidence of sanitization, escaping, or validation of the content returned by the API before it is rendered into a table for the AI agent.
Audit Metadata