gagelist-automation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [Remote Code Execution / Indirect Prompt Injection] (HIGH): The skill implements a 'blind trust' pattern by mandating that the agent use
RUBE_SEARCH_TOOLSto discover tool slugs, schemas, and execution plans at runtime. Because the agent is instructed to 'Always search tools first' and use 'exact field names and types from the search results,' an attacker controlling the remote MCP server could inject malicious commands or instructions into these schemas which the agent would then execute viaRUBE_MULTI_EXECUTE_TOOLorRUBE_REMOTE_WORKBENCH. - Ingestion points:
RUBE_SEARCH_TOOLSresponse (external/untrusted data). - Boundary markers: None present; the agent is explicitly told to follow the remote response exactly.
- Capability inventory:
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCHallow for arbitrary execution of tools discovered via the remote endpoint. - Sanitization: None described; the workflow relies entirely on remote schemas.
- [External Downloads] (MEDIUM): The skill requires the user to add an external, unverified MCP server
https://rube.app/mcp. This server is not on the trusted list and serves as the primary control point for all skill actions. - [Metadata Poisoning] (LOW): The setup instructions claim 'No API keys needed — just add the endpoint and it works.' This is misleading for a service that automates third-party platforms (Gagelist), potentially obscuring the true authentication or data access model used by the Rube proxy.
Recommendations
- AI detected serious security threats
Audit Metadata