write-meeting-notes
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands such as
curlandjqto interact with the Notion API and process JSON data. These operations are restricted to the core functionality of publishing meeting records. - [EXTERNAL_DOWNLOADS]: Communicates with
api.notion.comto query databases and create pages. Notion is a well-known and established service, and the use of its official API is appropriate for the skill's stated purpose. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests and processes untrusted data from meeting transcripts and external files.
- Ingestion points: Meeting content is ingested from user-pasted text (Source A) or read from file paths provided by the user (Source B) in
SKILL.md. - Boundary markers: The skill does not implement delimiters or explicit instructions to the agent to ignore embedded commands within the meeting content.
- Capability inventory: The skill possesses network access via
curland file-reading capabilities for local configuration inSKILL.md. - Sanitization: The skill employs
jq --argwhen building the final JSON payload in Phase 4-3, which effectively escapes the untrusted meeting content and prevents traditional shell command injection.
Audit Metadata