extract-my-action-items
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands using
node -e,python3 -c, andjqto parse transcript data. It also usesexecSyncwithin local Node.js scripts (fetch-slack-users.mjs,slack-post.mjs) to perform API requests viacurl. - [EXTERNAL_DOWNLOADS]: The skill makes network requests to the Slack API (
https://slack.com/api/) usingcurlto fetch user lists and post messages. These interactions are with a well-known service and are part of the skill's intended functionality. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). It ingests untrusted meeting transcripts from Fireflies and passes this content to subagents without sufficient boundary markers or sanitization. Malicious instructions embedded in a transcript could potentially influence the agent's behavior when generating Linear ticket proposals or Slack DMs. Ingestion points: Fireflies transcripts fetched via MCP. Boundary markers: Missing in Phase 3 subagent prompts for transcript chunk processing. Capability inventory: Linear ticket creation and modification via MCP; Slack DM posting via local scripts. Sanitization: No evidence of input sanitization or validation of transcript content before processing.
Audit Metadata