zyte-api-automation
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [External Downloads] (LOW): The skill requires connecting to an external MCP server endpoint at
https://rube.app/mcp. This domain is not included in the 'Trusted External Sources' list. - [Remote Code Execution] (LOW): The skill uses
RUBE_MULTI_EXECUTE_TOOLandRUBE_REMOTE_WORKBENCHto invoke remote tools and operations. This involves the execution of logic hosted on a remote platform managed by Composio/Rube. - [Indirect Prompt Injection] (LOW): The skill exhibits a vulnerability surface for indirect prompt injection.
- Ingestion points: Data entering the agent context via
RUBE_SEARCH_TOOLS(schemas, plans) andRUBE_MULTI_EXECUTE_TOOL(execution results). - Boundary markers: Absent. There are no instructions for the agent to treat tool outputs as untrusted data or to ignore embedded instructions in those outputs.
- Capability inventory:
RUBE_MULTI_EXECUTE_TOOL,RUBE_REMOTE_WORKBENCH, andRUBE_MANAGE_CONNECTIONSprovide significant functional reach. - Sanitization: Absent. The instructions do not specify any validation or sanitization of the data returned by the remote tools before it is processed by the agent.
Audit Metadata