skills/datadrivenconstruction/ddc_skills_for_ai_agents_in_construction/email-construction/Gen Agent Trust Hub
email-construction
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [DATA_EXFILTRATION]: The
ConstructionEmailSenderclass inSKILL.mdcontains asendmethod that programmatically reads files from the local filesystem and attaches them to outgoing emails. Because the skill requestsfilesystempermissions inclaw.json, an attacker could potentially exploit the agent to exfiltrate sensitive files (such as SSH keys, environmental variables, or configuration files) by tricking the agent into adding those file paths to the attachments list. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. The
instructions.mdfile directs the agent to accept and process project data from external formats like CSV, Excel, and JSON. The Python logic inSKILL.md(e.g.,generate_rfi_response_email) uses f-strings to directly interpolate user-provided content into email bodies without any sanitization or boundary markers. Malicious instructions embedded within a processed Excel log or RFI query could lead the agent to ignore its primary task or execute unintended actions. - [CREDENTIALS_UNSAFE]: The
ConstructionEmailSenderclass is designed to handle SMTP authentication using ausernameandpassword. While the code snippets provide a functional template, the architecture requires the agent to manage plaintext credentials in its environment or context to perform its core function, increasing the risk of credential exposure if the agent's memory is accessed through prompt injection.
Audit Metadata