mezmo-automation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill's core workflow requires calling
RUBE_SEARCH_TOOLSto fetch schemas and 'recommended execution plans'. Since these instructions are fetched from an external, untrusted source (rube.app) and processed by the agent to determine its next steps, an attacker controlling the remote server could inject malicious instructions into the execution plan. - Ingestion points: Output from
RUBE_SEARCH_TOOLSinSKILL.md. - Boundary markers: None identified; the agent is told to 'Always search tools first' and follow returned results.
- Capability inventory:
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCHprovide the ability to execute operations on Mezmo (log data) and potentially arbitrary code on a remote workbench. - Sanitization: None; the skill relies entirely on the correctness of the remote response.
- Remote Code/Tool Execution (HIGH): The skill utilizes
RUBE_REMOTE_WORKBENCHandRUBE_MULTI_EXECUTE_TOOL. These tools allow for the execution of logic defined by the remote MCP server. Without a trusted relationship with the provider (rube.app), this constitutes an unverified remote execution surface. - External Downloads/Dependencies (MEDIUM): The skill mandates adding
https://rube.app/mcpas an MCP server. This domain is not on the trusted sources list. While it provides functionality, it introduces a dependency on an unverified third-party infrastructure.
Recommendations
- AI detected serious security threats
Audit Metadata