notion-research-documentation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Prompt Injection] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It retrieves untrusted content from the Notion workspace and possesses the write permissions required to execute malicious instructions found within that data.
- Ingestion points: Retrieves arbitrary page content via
Notion:notion-fetchas described inSKILL.md. - Boundary markers: Absent; the workflow and templates do not use delimiters or instructions to disregard malicious prompts embedded in the fetched content.
- Capability inventory: Employs
Notion:notion-create-pagesandNotion:notion-update-pageto modify workspace state based on the researched data. - Sanitization: Absent; no escaping or validation is performed on retrieved content before it is processed for synthesis.
- [Command Execution] (MEDIUM): The
SKILL.mdworkflow instructs the agent to perform system-level configuration changes, includingcodex --enable rmcp_clientandcodex mcp login. - [External Downloads] (MEDIUM): The skill directs the installation of an MCP tool from an external, unverifiable URL (
https://mcp.notion.com/mcp) usingcodex mcp add.
Recommendations
- AI detected serious security threats
Audit Metadata