ops-marketing
Fail
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
setupcommand performs aggressive scanning of sensitive local files and system utilities to harvest credentials and user activity data. Findings include: accessing Google Chrome's local history database viasqlite3to extract visited URLs; attempting to retrieve passwords and tokens from the macOS Keychain usingsecurity find-generic-password; scanning user shell profiles such as~/.zshrcand~/.bashrcand.envrcfiles for API keys; and interrogating Dashlane and Doppler CLI tools for secrets across all projects. - [PROMPT_INJECTION]: The skill demonstrates a surface for indirect prompt injection through its ingestion of external data. Ingestion points: Fetches data from Klaviyo, Meta Graph API, and Google Ads API (e.g., campaign names and search terms). Boundary markers: Absent when interpolating this data into the
Agentprompt. Capability inventory: IncludesBash,Read,Write, andAgent. Sanitization: Absent for content retrieved from external APIs. - [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to execute complex shell logic, including querying local databases and iterating through system secret managers, which presents a significant privacy risk and high-risk use of system utilities.
Recommendations
- AI detected serious security threats
Audit Metadata