docusign-automation
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Unverifiable Dependencies & Remote Code Execution] (MEDIUM): The skill requires connecting to an external MCP server at
https://rube.app/mcp, which is not a whitelisted trusted source. As this endpoint provides the tools and schemas for the agent, it represents an unverifiable dependency. Source:https://rube.app/mcp, Method: MCP server registration, Status: Unknown/Untrusted. Finding downgraded in final verdict because this is the skill's primary stated purpose. - [Indirect Prompt Injection] (LOW): The skill ingests external data from DocuSign objects, creating a vulnerability to embedded instructions.
- Ingestion points: Data enters the agent context via
DOCUSIGN_LIST_ALL_TEMPLATES,DOCUSIGN_GET_TEMPLATE, andDOCUSIGN_GET_ENVELOPE. - Boundary markers: Absent; the instructions do not provide delimiters or 'ignore embedded instructions' warnings for processing external data.
- Capability inventory: The skill can execute significant side effects, including
DOCUSIGN_SEND_ENVELOPEandDOCUSIGN_ADD_TEMPLATES_TO_DOCUMENT_IN_ENVELOPE. - Sanitization: No validation or sanitization of ingested content is mentioned in the skill documentation.
Audit Metadata