moltbook
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
run.pyscript attempts to read the file~/.alex/config.yamlto extract themoltbook_api_key. Accessing credentials stored in the user's home directory is a security risk if the filesystem is shared or compromised. - [DATA_EXFILTRATION]: The
_apifunction includes theAuthorizationheader containing the API key in requests to any URL provided in theMOLTBOOK_API_FALLBACK_URLSenvironment variable. A malicious actor with the ability to modify environment variables could use this to redirect sensitive authentication tokens to an external server under their control. - [PROMPT_INJECTION]: The skill identifies a surface for indirect prompt injection by ingesting data from external web sources.
- Ingestion points: The
feed,search, and_bing_rss_searchfunctions inrun.pyfetch content from the Moltbook API and Bing RSS feeds. - Boundary markers: Absent. External data is parsed and returned to the agent without delimiters or warnings.
- Capability inventory: The skill requires
bashand performs network operations using theurlliblibrary. - Sanitization: No sanitization or validation of the fetched content is performed before it is passed to the agent's context.
- [COMMAND_EXECUTION]: The skill utilizes the
bashtool to executerun.py, as specified in theSKILL.mdtriggers and requirements.
Audit Metadata