grist-automation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [External Downloads] (HIGH): The skill requires connecting to an external MCP endpoint (
https://rube.app/mcp). This domain is not within the defined trust scope. Any instructions, schemas, or logic provided by this endpoint are executed with the agent's permissions. - [Indirect Prompt Injection] (HIGH): The skill is highly vulnerable to poisoning via external tool registries.
- Ingestion points:
RUBE_SEARCH_TOOLSfetches dynamic schemas and recommended execution plans from the external server (SKILL.md). - Boundary markers: Absent. Instructions explicitly tell the agent to 'Always search tools first' and 'Use exact field names and types from the search results.'
- Capability inventory:
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCHprovide significant execution capabilities (SKILL.md). - Sanitization: None. The agent is instructed to follow instructions returned by the external search tool.
- [Command Execution] (MEDIUM): The skill's workflow is driven by dynamically fetched tool slugs via
RUBE_MULTI_EXECUTE_TOOL. This can lead to the execution of unintended or malicious commands if the external registry is compromised or malicious.
Recommendations
- AI detected serious security threats
Audit Metadata