alicloud-network-esa
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill documentation identifies standard locations for Alibaba Cloud authentication credentials.
- Evidence:
SKILL.mdreferences environment variablesALICLOUD_ACCESS_KEY_ID,ALICLOUD_ACCESS_KEY_SECRET, and the config file~/.alibabacloud/credentials. - [EXTERNAL_DOWNLOADS]: The skill fetches machine-readable API documentation from a well-known service provider.
- Evidence:
scripts/list_openapi_meta_apis.pyconnects toapi.aliyun.comto download ESA API metadata. - [COMMAND_EXECUTION]: Local scripts are used to automate the discovery of available cloud APIs.
- Evidence:
SKILL.mdcontains instructions to executescripts/list_openapi_meta_apis.pyusing the Python interpreter. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface due to the ingestion of external API metadata.
- Ingestion points:
scripts/list_openapi_meta_apis.py(fetches JSON fromapi.aliyun.com). - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are used during metadata discovery.
- Capability inventory: The skill can perform site management, DNS/record operations, and security rule changes via mutate APIs.
- Sanitization: There is no evidence of content validation or sanitization for the fetched metadata fields.
Audit Metadata