securitytrails-automation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is designed to process external, untrusted data from SecurityTrails (such as DNS records, WHOIS data, and subdomain listings). This data can be manipulated by attackers to include malicious instructions.
- Ingestion points: External data fetched via SecurityTrails tool calls in
SKILL.md. - Boundary markers: Absent; there are no instructions to the agent to treat SecurityTrails output as untrusted data or to use delimiters.
- Capability inventory: The skill uses
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCH, which allow the agent to execute a wide variety of tools and operations based on processed data. - Sanitization: Absent; the skill relies on raw tool outputs to determine subsequent
TOOL_SLUGandargumentsin Step 3 of the workflow. - External Downloads & Untrusted Sources (MEDIUM): The setup instructions require the user to add
https://rube.app/mcpas an MCP server. This domain is not part of the [TRUST-SCOPE-RULE] whitelist. While it claims to be powered by Composio, the endpoint itself is an unverified third-party service providing executable tool definitions to the agent. - Remote Code Execution (HIGH): The workflow encourages a pattern where tool schemas and execution plans are dynamically retrieved via
RUBE_SEARCH_TOOLSand then executed viaRUBE_MULTI_EXECUTE_TOOL. If the external MCP server or the data source (SecurityTrails) is compromised, it can lead to the execution of arbitrary tools with attacker-controlled arguments.
Recommendations
- AI detected serious security threats
Audit Metadata