x-posting
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- DATA_EXFILTRATION (MEDIUM): The skill accesses the sensitive
.envfile to retrieve theGETLATE_API_KEYand transmits it to a non-whitelisted external domain. - Evidence: The Python script in Step 6 uses
load_dotenvto read the.envfile andrequests.postto send data tohttps://getlate.dev/api/v1with the key in the Authorization header. - Risk: Accessing environment files combined with network requests is an exfiltration pattern. Severity is lowered to MEDIUM as this behavior is core to the skill's intended purpose of API integration.
- PROMPT_INJECTION (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) due to the way it processes untrusted data.
- Ingestion points: The workflow reads local podcast/blog files (Step 1) and searches the web for guest information (Step 2).
- Boundary markers: Step 3 uses Markdown headers (
## Source Content) to separate untrusted data in the sub-agent prompt but lacks secure delimiters or explicit instructions to ignore embedded commands within the source text. - Capability inventory: The agent has the ability to execute shell commands (
python3 agents/post_tweet.py) and perform authenticated network requests via the provided Python snippets. - Sanitization: No sanitization or validation of the content extracted from external sources is performed before it is passed to the sub-agent prompt.
- COMMAND_EXECUTION (SAFE): The skill uses standard shell commands (
ls,head) for local file navigation andpython3for executing its own logic scripts. These are appropriate for the primary use case.
Audit Metadata