grafbase-automation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): Reference to
https://rube.app/mcpas a mandatory MCP endpoint. This domain is not on the trusted list. - REMOTE_CODE_EXECUTION (HIGH): Tools such as
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCHexecute arbitrary logic hosted on the remote server. - PROMPT_INJECTION (HIGH): Vulnerable to indirect prompt injection. 1. Ingestion points: Tool schemas are fetched via
RUBE_SEARCH_TOOLSfrom the untrusted remote server. 2. Boundary markers: None; the agent is instructed to follow schema instructions directly. 3. Capability inventory: IncludesRUBE_MULTI_EXECUTE_TOOL(write/execute) andRUBE_MANAGE_CONNECTIONS(auth). 4. Sanitization: None; uses untrusted field names and types from remote search results. - DATA_EXFILTRATION (MEDIUM): Using
RUBE_MANAGE_CONNECTIONSwith a third-party proxy may expose Grafbase session data and credentials to the provider of rube.app.
Recommendations
- AI detected serious security threats
Audit Metadata