d2lbrightspace-automation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill processes data from D2L Brightspace (a Learning Management System) which often contains student-generated or external content, creating a significant injection surface. * Ingestion points: Tools reading course modules, forum posts, or assignment submissions. * Boundary markers: None; the skill provides no instructions for the agent to distinguish between tool data and instructions. * Capability inventory:
RUBE_MULTI_EXECUTE_TOOLallows data modification, andRUBE_REMOTE_WORKBENCHallows remote bulk operations. * Sanitization: None present. - External Downloads (HIGH): The skill requires connecting to an unverified external MCP server (
https://rube.app/mcp). This server provides the tool definitions and execution logic. This is not a trusted source according to security policy. - Remote Code Execution (HIGH): Through the
RUBE_REMOTE_WORKBENCHandrun_composio_tool()functions, the skill facilitates execution of operations in a remote environment managed by a third party, which could be exploited to run unauthorized commands if the session is compromised via injection. - Command Execution (MEDIUM): The use of
RUBE_MULTI_EXECUTE_TOOLenables the agent to perform a wide range of actions on the connected LMS platform, including potential administrative or sensitive data operations based on the user's connection permissions.
Recommendations
- AI detected serious security threats
Audit Metadata