campaign-cleaner-automation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill creates a high-risk surface by processing untrusted data with high-privilege capabilities.
- Ingestion points: The
campaign_cleanertoolkit processes data from external marketing campaigns (e.g., email content, ad copy). - Boundary markers: There are no instructions to use delimiters or ignore embedded instructions within the campaign data.
- Capability inventory: The skill has access to
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCH, enabling modification of data and execution of remote functions. - Sanitization: No sanitization or validation of the ingested campaign content is described.
- [Remote Code Execution] (HIGH): The skill directs the agent to connect to an external, unverified MCP server and execute tools remotely.
- Evidence: The instruction to use
https://rube.app/mcpand theRUBE_REMOTE_WORKBENCHtool allows execution of logic on a remote infrastructure not controlled by the user. - The 'No API keys needed' claim suggests a lack of standard credential-based access control for remote execution.
- [Unverifiable Dependencies] (MEDIUM): Reliance on an external source not present in the Trusted External Sources list.
- Evidence: The endpoint
rube.appand toolkitcampaign_cleanerare third-party services that have not been vetted for safety.
Recommendations
- AI detected serious security threats
Audit Metadata